Red-m

1050ap Lan Acess Point

6 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 3.15%
  • Veröffentlicht 26.07.2002 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Buffer overflow in Red-M 1050 (Bluetooth Access Point) management web interface allows remote attackers to cause a denial of service and possibly execute arbitrary code via a long administration password.

Exploit
  • EPSS 0.7%
  • Veröffentlicht 26.07.2002 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Red-M 1050 (Bluetooth Access Point) uses case insensitive passwords, which makes it easier for attackers to conduct a brute force guessing attack due to the smaller space of possible passwords.

Exploit
  • EPSS 1.21%
  • Veröffentlicht 26.07.2002 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

The TFTP server for Red-M 1050 (Bluetooth Access Point) can not be disabled and makes it easier for remote attackers to crack the administration password via brute force methods.

Exploit
  • EPSS 0.53%
  • Veröffentlicht 26.07.2002 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

The web management server for Red-M 1050 (Bluetooth Access Point) does not use session-based credentials to authenticate users, which allows attackers to connect to the server from the same IP address as a user who has already established a session.

Exploit
  • EPSS 0.35%
  • Veröffentlicht 26.07.2002 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Red-M 1050 (Bluetooth Access Point) publicizes its name, IP address, and other information in UDP packets to a broadcast address, which allows any system on the network to obtain potentially sensitive information about the Access Point device by moni...

Exploit
  • EPSS 0.82%
  • Veröffentlicht 26.07.2002 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Red-M 1050 (Bluetooth Access Point) PPP server allows bonded users to cause a denial of service and possibly execute arbitrary code via a long user name.