Computer Security
[EN] securityvulns.ru no-pyccku


Linksys WAP54G access point unauthroized access
updated since 15.06.2010
Published:23.06.2010
Source:
SecurityVulns ID:10933
Type:remote
Threat Level:
6/10
Description:Debug interface with hardcoded Gemtek/gemtekswd account is available.
Affected:LINKSYS : Linksys WAP54G
Original documentdocumentCristofaro Mune, IS-2010-003 - Linksys WAP54Gv3 debug.cgi Cross-Site Scripting (23.06.2010)
 documentCristofaro Mune, IS-2010-002 - Linksys WAP54Gv3 Remote Debug Root Shell (15.06.2010)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod