1 results (0.003 seconds)

CVSS: 5.0EPSS: 3%CPEs: 2EXPL: 2

BT Voyager 2091 Wireless firmware 2.21.05.08m_A2pB018c1.d16d and earlier, and 3.01m and earlier, allow remote attackers to bypass the authentication process and gain sensitive information, such as configuration information via (1) /btvoyager_getconfig.sh, PPP credentials via (2) btvoyager_getpppcreds.sh, and decode configuration credentials via (3) btvoyager_decoder.c. El firmware BT Voyager 2091 Wireless 2.21.05.08m_A2pB018c1.d16d y anteriores, y 3.01m y anteriores, permite a atacantes remotos evitar el proceso de autenticación y obtener información sensible, por ejemplo información de configuración, mediante (1) /btvoyager_getconfig.sh, credenciales PPP mediante (2) btvoyager_getpppcreds.sh, y decodificar credenciales de configuración mediante btvoyager_decoder.c. • https://www.exploit-db.com/exploits/2034 http://ikwt.dyndns.org/projects/btvoyager-getconfig.txt http://lists.grok.org.uk/pipermail/full-disclosure/2006-July/047733.html http://secunia.com/advisories/20982 http://www.gnucitizen.org/blog/holes-in-embedded-devices-authentication-bypass-pt-3 http://www.gnucitizen.org/projects/router-hacking-challenge http://www.securityfocus.com/archive/1/440405/100/0/threaded http://www.securityfocus.com/archive/1/489009/100/0/threaded http://www.s • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-264: Permissions, Privileges, and Access Controls •