Описание
Information leak in Compaq WL310, and the Orinoco Residential Gateway access point it is based on, uses a system identification string as a default SNMP read/write community string, which allows remote attackers to obtain and modify sensitive configuration information by querying for the identification string.
Ссылки
- Broken Link
- Broken Link
- Broken Link
- Third Party AdvisoryVDB Entry
- Broken Link
- Broken Link
- Broken Link
- Third Party AdvisoryVDB Entry
Уязвимые конфигурации
Конфигурация 1
Одновременно
cpe:2.3:o:hpe:compaq_wl310_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:hpe:compaq_wl310:-:*:*:*:*:*:*:*
Конфигурация 2
Одновременно
cpe:2.3:o:proxim:orinoco_rg-1000_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:proxim:orinoco_rg-1000:-:*:*:*:*:*:*:*
Конфигурация 3
Одновременно
cpe:2.3:o:proxim:orinoco_rg-1100_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:proxim:orinoco_rg-1100:-:*:*:*:*:*:*:*
EPSS
Процентиль: 92%
0.08338
Низкий
6.4 Medium
CVSS2
Дефекты
CWE-200
Связанные уязвимости
github
почти 4 года назад
Information leak in Compaq WL310, and the Orinoco Residential Gateway access point it is based on, uses a system identification string as a default SNMP read/write community string, which allows remote attackers to obtain and modify sensitive configuration information by querying for the identification string.
EPSS
Процентиль: 92%
0.08338
Низкий
6.4 Medium
CVSS2
Дефекты
CWE-200