An issue was discovered in Polycom Web Management Interface G3/HDX 8000 HD with Durango 2.6.0 4740 software and embedded Polycom Linux Development Platform 2.14.g3. It has a blank administrative password by default, and can be successfully used without setting this password.
References
Link | Resource |
---|---|
https://web.archive.org/web/20130320033016/http://blog.tempest.com.br/joao-paulo-campello/path-traversal-on-polycom-web-management-interface.html | Exploit Third Party Advisory |
https://www.exploit-db.com/exploits/43032 | Exploit Third Party Advisory VDB Entry |
https://web.archive.org/web/20130320033016/http://blog.tempest.com.br/joao-paulo-campello/path-traversal-on-polycom-web-management-interface.html | Exploit Third Party Advisory |
https://www.exploit-db.com/exploits/43032 | Exploit Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 01:46
Type | Values Removed | Values Added |
---|---|---|
References | () https://web.archive.org/web/20130320033016/http://blog.tempest.com.br/joao-paulo-campello/path-traversal-on-polycom-web-management-interface.html - Exploit, Third Party Advisory | |
References | () https://www.exploit-db.com/exploits/43032 - Exploit, Third Party Advisory, VDB Entry |
Information
Published : 2020-02-10 15:15
Updated : 2024-11-21 01:46
NVD link : CVE-2012-6611
Mitre link : CVE-2012-6611
CVE.ORG link : CVE-2012-6611
JSON object : View
Products Affected
polycom
- hdx_4500
- hdx_9004
- hdx_8002
- hdx_6000
- hdx_9006
- hdx_8004
- hdx_7001
- hdx_7002
- hdx_4002
- hdx_9002
- hdx_system_software
- hdx_8006
CWE
CWE-798
Use of Hard-coded Credentials