Логотип exploitDog
bind:CVE-2016-9497
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2016-9497

Количество 2

Количество 2

nvd логотип

CVE-2016-9497

больше 7 лет назад

Hughes high-performance broadband satellite modems, models HN7740S DW7000 HN7000S/SM, is vulnerable to an authentication bypass using an alternate path or channel. By default, port 1953 is accessible via telnet and does not require authentication. An unauthenticated remote user can access many administrative commands via this interface, including rebooting the modem.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-qq6r-2668-c4wg

больше 3 лет назад

Hughes high-performance broadband satellite modems, models HN7740S DW7000 HN7000S/SM, is vulnerable to an authentication bypass using an alternate path or channel. By default, port 1953 is accessible via telnet and does not require authentication. An unauthenticated remote user can access many administrative commands via this interface, including rebooting the modem.

CVSS3: 8.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2016-9497

Hughes high-performance broadband satellite modems, models HN7740S DW7000 HN7000S/SM, is vulnerable to an authentication bypass using an alternate path or channel. By default, port 1953 is accessible via telnet and does not require authentication. An unauthenticated remote user can access many administrative commands via this interface, including rebooting the modem.

CVSS3: 8.8
5%
Низкий
больше 7 лет назад
github логотип
GHSA-qq6r-2668-c4wg

Hughes high-performance broadband satellite modems, models HN7740S DW7000 HN7000S/SM, is vulnerable to an authentication bypass using an alternate path or channel. By default, port 1953 is accessible via telnet and does not require authentication. An unauthenticated remote user can access many administrative commands via this interface, including rebooting the modem.

CVSS3: 8.8
5%
Низкий
больше 3 лет назад

Уязвимостей на страницу