Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-6pgq-jgqc-vp7f

Опубликовано: 30 апр. 2022
Источник: github
Github: Не прошло ревью

Описание

The web-based configuration interface for the Cisco ATA 186 Analog Telephone Adaptor allows remote attackers to bypass authentication via an HTTP POST request with a single byte, which allows the attackers to (1) obtain the password from the login screen, or (2) reconfigure the adaptor by modifying certain request parameters.

The web-based configuration interface for the Cisco ATA 186 Analog Telephone Adaptor allows remote attackers to bypass authentication via an HTTP POST request with a single byte, which allows the attackers to (1) obtain the password from the login screen, or (2) reconfigure the adaptor by modifying certain request parameters.

EPSS

Процентиль: 90%
0.05453
Низкий

Связанные уязвимости

nvd
больше 23 лет назад

The web-based configuration interface for the Cisco ATA 186 Analog Telephone Adaptor allows remote attackers to bypass authentication via an HTTP POST request with a single byte, which allows the attackers to (1) obtain the password from the login screen, or (2) reconfigure the adaptor by modifying certain request parameters.

EPSS

Процентиль: 90%
0.05453
Низкий