| |
Vulnerability CVE-2013-5755
Published: 2014-07-16
Description: |
config/.htpasswd in Yealink IP Phone SIP-T38G has a hardcoded password of (1) user (s7C9Cx.rLsWFA) for the user account, (2) admin (uoCbM.VEiKQto) for the admin account, and (3) var (jhl3iZAe./qXM) for the var account, which makes it easier for remote attackers to obtain access via unspecified vectors. |
See advisories in our WLB2 database: | Topic | Author | Date |
High |
| RingZer0 Team | 18.07.2014 |
Type:
CWE-255 (Credentials Management)
CVSS2 => (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVSS Base Score |
Impact Subscore |
Exploitability Subscore |
10/10 |
10/10 |
10/10 |
Exploit range |
Attack complexity |
Authentication |
Remote |
Low |
No required |
Confidentiality impact |
Integrity impact |
Availability impact |
Complete |
Complete |
Complete |
References: |
http://www.exploit-db.com/exploits/33739
|
|
|
closedb();
?>
Copyright 2024, cxsecurity.com
|
|
|