Security Bypass Vulnerabilities AXESSTEL

2008.08.01
Risk: High
Local: No
Remote: Yes
CWE: CWE-287


CVSS Base Score: 10/10
Impact Subscore: 10/10
Exploitability Subscore: 10/10
Exploit range: Remote
Attack complexity: Low
Authentication: No required
Confidentiality impact: Complete
Integrity impact: Complete
Availability impact: Complete

Bboyhacks bboyhacks[at]gmail.com AXESS.TEL CDMA 1xEV-DO FIXED WIRELESS MODEN AXW-D800 S/W Version:D2_ETH_109_01_VEBR Jun-14-2006 Default LAN IP: 192.168.0.1 http thttpd 2.25b Security Bypass Vulnerabilities ______________________________________________________________________________ ______________________________________________________________________________ basic setup http://192.168.0.1/etc/config/System.html ******************************************************************************* Network http://192.168.0.1/etc/config/Network.html ******************************************************************************** Firewall Setup http://192.168.0.1/etc/config/Security.html ******************************************************************************** restore basic setup options to default. http://192.168.0.1/cgi-bin/sysconf.cgi ******************************************************************************** Advanced Routing http://192.168.0.1/cgi-bin/route.cgi ********************************************************************************* Bboyhacks

References:

http://xforce.iss.net/xforce/xfdb/44044
http://www.securityfocus.com/bid/30404
http://www.securityfocus.com/archive/1/archive/1/494815/100/0/threaded


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top