The administration panel on the Airspan WiMax ProST 4.1 antenna with 6.5.38.0 software does not verify authentication credentials, which allows remote attackers to (1) upload malformed firmware or (2) bind the antenna to a different WiMAX base station via unspecified requests to forms under process_adv/.
References
Configurations
History
21 Nov 2024, 00:44
Type | Values Removed | Values Added |
---|---|---|
References | () http://airspan4wimax.googlepages.com/ - Exploit | |
References | () http://secunia.com/advisories/29265 - Vendor Advisory | |
References | () http://www.0x000000.com/?i=524 - | |
References | () http://www.gnucitizen.org/projects/router-hacking-challenge/ - Exploit | |
References | () http://www.kb.cert.org/vuls/id/248372 - US Government Resource | |
References | () http://www.securityfocus.com/archive/1/489009/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/28122 - Exploit | |
References | () http://www.sharemethods.net/nepal/servlet/open?keeppath=false&aid=29820 - | |
References | () http://www.vupen.com/english/advisories/2008/0802/references - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/41052 - |
Information
Published : 2008-03-10 17:44
Updated : 2024-11-21 00:44
NVD link : CVE-2008-1262
Mitre link : CVE-2008-1262
CVE.ORG link : CVE-2008-1262
JSON object : View
Products Affected
airspan
- wimax_prost
CWE
CWE-287
Improper Authentication