{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-05T21:46:58.144","vulnerabilities":[{"cve":{"id":"CVE-2016-6551","sourceIdentifier":"cret@cert.org","published":"2018-07-13T20:29:00.613","lastModified":"2024-11-21T02:56:20.333","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Intellian Satellite TV antennas t-Series and v-Series, firmware version 1.07, uses non-random default credentials of: ftp/ftp or intellian:12345678. A remote network attacker can gain elevated access to a vulnerable device."},{"lang":"es","value":"Las antenas de TV por satélite Intellian en las series t y v, con la versión 1.07 de firmware, emplean credenciales por defecto no aleatorias de: ftp/ftp o intellian:12345678. Un atacante remoto en la red puede obtener acceso elevado a un dispositivo vulnerable."}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"cret@cert.org","type":"Secondary","description":[{"lang":"en","value":"CWE-255"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-255"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:intelliantech:v60_firmware:1.07:*:*:*:*:*:*:*","matchCriteriaId":"6D8A07AF-7B65-4D49-938C-AC3782C7185A"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:intelliantech:v60:-:*:*:*:*:*:*:*","matchCriteriaId":"AD40B4F0-9CB1-45A5-A5E6-1480D315B5CD"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:intelliantech:v60ka_firmware:1.07:*:*:*:*:*:*:*","matchCriteriaId":"CC912BB2-BB1F-4A51-86FF-FB807038E58E"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:intelliantech:v60ka:-:*:*:*:*:*:*:*","matchCriteriaId":"0EBAAE16-4FF2-48CB-B391-9D59A4439166"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:intelliantech:v65_firmware:1.07:*:*:*:*:*:*:*","matchCriteriaId":"C4BC38A1-E262-426D-9E08-98B7BD1E0A88"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:intelliantech:v65:-:*:*:*:*:*:*:*","matchCriteriaId":"800EFF7B-D91E-45C0-92E6-5E2EB6FDB6D9"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:intelliantech:v80g_firmware:1.07:*:*:*:*:*:*:*","matchCriteriaId":"DF595BF1-5355-4036-82C7-A8D4F93D20D9"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:intelliantech:v80g:-:*:*:*:*:*:*:*","matchCriteriaId":"0CAD3CCD-8A8C-4FB1-A6AA-3CE457330253"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:intelliantech:t80w_firmware:1.07:*:*:*:*:*:*:*","matchCriteriaId":"1AB17431-657F-47DC-8902-0529F5E87AE8"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:intelliantech:t80w:-:*:*:*:*:*:*:*","matchCriteriaId":"D7D7EF6E-AD3E-4043-BEE4-377A74BC17E8"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:intelliantech:t80q_firmware:1.07:*:*:*:*:*:*:*","matchCriteriaId":"C80CD55F-968D-486D-93A7-4AA6742B59A4"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:intelliantech:t80q:-:*:*:*:*:*:*:*","matchCriteriaId":"6923C2A8-F40F-407E-91B1-8FAD9E5A32FD"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:intelliantech:t100w_firmware:1.07:*:*:*:*:*:*:*","matchCriteriaId":"C9FA7288-43E5-4C84-97D0-C3052200BC64"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:intelliantech:t100w:-:*:*:*:*:*:*:*","matchCriteriaId":"71B219C9-3B50-477B-9A1B-C3C4FA9DFA6F"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:intelliantech:t100q_firmware:1.07:*:*:*:*:*:*:*","matchCriteriaId":"AEFB7EE3-B593-445D-98B3-C0F99E8CD896"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:intelliantech:t100q:-:*:*:*:*:*:*:*","matchCriteriaId":"853B7819-1FF4-45DA-B68F-3AA3C231CF15"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:intelliantech:t110w_firmware:1.07:*:*:*:*:*:*:*","matchCriteriaId":"61D13EA3-E18C-4A43-8F2B-D00417AC5292"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:intelliantech:t110w:-:*:*:*:*:*:*:*","matchCriteriaId":"B3209D24-A994-40E0-BB9E-423E81BF39ED"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:intelliantech:t110q_firmware:1.07:*:*:*:*:*:*:*","matchCriteriaId":"2C9B1957-8458-4FCF-A3DC-C58546F7B0CB"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:intelliantech:t110q:-:*:*:*:*:*:*:*","matchCriteriaId":"5EEBE568-2A96-415C-8D04-F4D39CBE9F2C"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:intelliantech:t130w_firmware:1.07:*:*:*:*:*:*:*","matchCriteriaId":"56788A9F-F7C4-4247-A628-74F5C7139344"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:intelliantech:t130w:-:*:*:*:*:*:*:*","matchCriteriaId":"EC98DA8C-610F-4E42-84AF-2F42FA885DB2"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:intelliantech:t130q_firmware:1.07:*:*:*:*:*:*:*","matchCriteriaId":"089722B1-06AB-428E-8993-462BDAAD80DA"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:intelliantech:t130q:-:*:*:*:*:*:*:*","matchCriteriaId":"F4CA96A7-10C8-4B59-9B16-CD1A43BAF38A"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:intelliantech:t240ck_firmware:1.07:*:*:*:*:*:*:*","matchCriteriaId":"CD65163F-A795-48C3-9498-9D35F8424B0F"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:intelliantech:t240ck:-:*:*:*:*:*:*:*","matchCriteriaId":"387C7FE6-482D-48D5-9BBF-55C7821E4E01"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/93808","source":"cret@cert.org","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://www.kb.cert.org/vuls/id/200907","source":"cret@cert.org","tags":["Third Party Advisory","US Government Resource"]},{"url":"http://www.securityfocus.com/bid/93808","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://www.kb.cert.org/vuls/id/200907","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","US Government Resource"]}]}}]}