The web-based administrative interface for 3Com OfficeConnect Wireless 11g Access Point (AP) 1.00.08, and possibly earlier versions before 1.03.07A, allows remote attackers to bypass authentication and obtain sensitive information by directly accessing the (1) config.bin (2) profile.wlp?PN=ggg or (3) event.logs URLs.
References
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 23:54
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/13942 - | |
References | () http://securitytracker.com/id?1012958 - | |
References | () http://www.idefense.com/application/poi/display?id=188&type=vulnerabilities - Vendor Advisory | |
References | () http://www.securityfocus.com/bid/12322 - Patch, Vendor Advisory | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/18994 - |
Information
Published : 2005-04-14 04:00
Updated : 2024-11-20 23:54
NVD link : CVE-2005-0112
Mitre link : CVE-2005-0112
CVE.ORG link : CVE-2005-0112
JSON object : View
Products Affected
3com
- 3crwe454g72
CWE