CVE-2005-3717

The telnet daemon in UTStarcom F1000 VOIP WIFI Phone s2.0 running VxWorks 5.5.1 with kernel WIND 2.6 has a default username "target" and password "password", which allows remote attackers to gain full access to the system.
Configurations

Configuration 1 (hide)

cpe:2.3:h:utstarcom:f1000_voip_wifi_phone:2.0:*:*:*:*:*:*:*

History

21 Nov 2024, 00:02

Type Values Removed Values Added
References () http://lists.grok.org.uk/pipermail/full-disclosure/2005-November/038834.html - Vendor Advisory () http://lists.grok.org.uk/pipermail/full-disclosure/2005-November/038834.html - Vendor Advisory
References () http://secunia.com/advisories/17629 - Vendor Advisory () http://secunia.com/advisories/17629 - Vendor Advisory
References () http://www.securityfocus.com/bid/15476 - () http://www.securityfocus.com/bid/15476 -
References () http://www.vupen.com/english/advisories/2005/2472 - () http://www.vupen.com/english/advisories/2005/2472 -

Information

Published : 2005-11-21 11:03

Updated : 2024-11-21 00:02


NVD link : CVE-2005-3717

Mitre link : CVE-2005-3717

CVE.ORG link : CVE-2005-3717


JSON object : View

Products Affected

utstarcom

  • f1000_voip_wifi_phone