Описание
/bin/login.php in the Web Panel on the Airtame HDMI dongle with firmware before 3.0 allows an attacker to set his own session id via a "Cookie: PHPSESSID=" header. This can be used to achieve persistent access to the admin panel even after an admin password change.
Уязвимые конфигурации
Конфигурация 1Версия до 2.3.3 (включая)
Одновременно
cpe:2.3:o:airtame:hdmi_dongle_firmware:*:b1:*:*:*:*:*:*
cpe:2.3:h:airtame:hdmi_dongle:-:*:*:*:*:*:*:*
EPSS
Процентиль: 57%
0.00345
Низкий
9.8 Critical
CVSS3
7.5 High
CVSS2
Дефекты
CWE-384
Связанные уязвимости
CVSS3: 9.8
github
больше 3 лет назад
/bin/login.php in the Web Panel on the Airtame HDMI dongle with firmware before 3.0 allows an attacker to set his own session id via a "Cookie: PHPSESSID=" header. This can be used to achieve persistent access to the admin panel even after an admin password change.
EPSS
Процентиль: 57%
0.00345
Низкий
9.8 Critical
CVSS3
7.5 High
CVSS2
Дефекты
CWE-384