Submit #745497: Ziroom Smart Ziroom Smart Gateway (ZH-A0101) ZH-A0101 1.0.1.0 Backdoorinfo

TitleZiroom Smart Ziroom Smart Gateway (ZH-A0101) ZH-A0101 1.0.1.0 Backdoor
DescriptionThe Ziroom Smart Gateway (model ZH-A0101) contains a factory-default Telnet backdoor listening on port 23 (or non-standard port 1022 in some scans). It uses weak/hardcoded default credentials (e.g., username: root/admin, password: admin or empty) granting full root shell access remotely. The backdoor is enabled via a hard-coded startup script (/etc/init.d/telnet) that launches /usr/sbin/telnetd -l /bin/login.sh on boot, restoring default root access even after modifications. This allows unauthenticated or weakly authenticated remote code execution with root privileges, leading to full device compromise and persistent backdoor access. Affected: Confirmed on firmware x.x.x.x (released 2020-04-15). Potentially earlier versions. Reference: Manufacturer download center https://ziruai.cn/ Disclosure: Discovered and publicly disclosed 2026-01-23. File system extracted via UART shell.
Source⚠️ https://github.com/Blackhole23-Lab/-
User
 xxyNB (UID 94808)
Submission01/23/2026 10:23 AM (2 months ago)
Moderation02/03/2026 01:53 PM (11 days later)
StatusAccepted
VulDB entry343976 [Ziroom ZHOME A0101 1.0.1.0 Dropbear SSH Service default credentials]
Points20

Do you need the next level of professionalism?

Upgrade your account now!