IDC SFX2100 Satellite Receiver firmware ships with multiple daemon configuration files for routing components (e.g., zebra, bgpd, ospfd, and ripd) that are owned by root but world-readable. The configuration files (e.g., zebra.conf, bgpd.conf, ospfd.conf, ripd.conf) contain hardcoded or otherwise insecure plaintext passwords (including “enable”/privileged-mode credentials). A remote actor is able to abuse the reuse/hardcoded nature of these credentials to further access other systems in the network, gain a foothold on the satellite receiver or potentially locally privilege escalate.
References
| Link | Resource |
|---|---|
| https://www.abdulmhsblog.com/posts/sfx2100-vulns/ | Exploit Third Party Advisory |
| https://www.abdulmhsblog.com/posts/sfx2100-vulns/ | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2026-03-05 06:16
Updated : 2026-03-09 18:36
NVD link : CVE-2026-29128
Mitre link : CVE-2026-29128
CVE.ORG link : CVE-2026-29128
JSON object : View
Products Affected
datacast
- sfx2100_firmware
- sfx2100
