Samsung ADSL Modem SMDK8947v1.2 uses default passwords for the (1) root, (2) admin, or (3) user users, which allows remote attackers to gain privileges via Telnet or an HTTP request to adsl.cgi.
References
Link | Resource |
---|---|
http://exploitlabs.com/files/advisories/EXPL-A-2005-002-samsung-adsl.txt | Exploit Vendor Advisory |
http://securitytracker.com/id?1013615 | |
http://www.securityfocus.com/bid/12864 | |
http://zone-h.org/en/advisories/read/id=7339/ | Exploit Vendor Advisory |
http://exploitlabs.com/files/advisories/EXPL-A-2005-002-samsung-adsl.txt | Exploit Vendor Advisory |
http://securitytracker.com/id?1013615 | |
http://www.securityfocus.com/bid/12864 | |
http://zone-h.org/en/advisories/read/id=7339/ | Exploit Vendor Advisory |
Configurations
History
20 Nov 2024, 23:56
Type | Values Removed | Values Added |
---|---|---|
References | () http://exploitlabs.com/files/advisories/EXPL-A-2005-002-samsung-adsl.txt - Exploit, Vendor Advisory | |
References | () http://securitytracker.com/id?1013615 - | |
References | () http://www.securityfocus.com/bid/12864 - | |
References | () http://zone-h.org/en/advisories/read/id=7339/ - Exploit, Vendor Advisory |
Information
Published : 2005-05-02 04:00
Updated : 2024-11-20 23:56
NVD link : CVE-2005-0865
Mitre link : CVE-2005-0865
CVE.ORG link : CVE-2005-0865
JSON object : View
Products Affected
securecomputing
- samsung_adsl_modem
CWE