Share
## https://sploitus.com/exploit?id=PACKETSTORM:172875
Anevia Flamingo XL/XS 3.6.x Default/Hard-coded Credentials  
  
  
Vendor: Ateme  
Product web page: https://www.ateme.com  
Affected version: 3.6.20, 3.2.9  
Hardware revision 1.1, 1.0  
SoapLive 2.4.1, 2.0.3  
SoapSystem 1.3.1  
  
Summary: Flamingo XL, a new modular and high-density IPTV head-end  
product for hospitality and corporate markets. Flamingo XL captures  
live TV and radio content from satellite, cable, digital terrestrial  
and analog sources before streaming it over IP networks to STBs, PCs  
or other IP-connected devices. The Flamingo XL is based upon a modular  
4U rack hardware platform that allows hospitality and corporate video  
service providers to deliver a mix of channels from various sources  
over internal IP networks.  
  
Desc: The device uses a weak set of default and hard-coded administrative  
credentials that can be easily guessed in remote password attacks and  
gain full control of the system.  
  
Tested on: GNU/Linux 3.14.29 (x86_64)  
Apache/2.2.22 (Debian)  
PHP/5.6.0  
  
  
Vulnerability discovered by Gjoko 'LiquidWorm' Krstic  
@zeroscience  
  
  
Advisory ID: ZSL-2023-5777  
Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2023-5777.php  
  
  
13.04.2023  
  
--  
  
  
SSH: root:anevia  
SSH: enable:paris  
WEB: admin:paris  
WEB: monitor:anevia  
OEM: monitor:anevia  
OEM: monitor:teleste  
OEM: monitor:envivio  
OEM: monitor:blankom