Page 40 of 213 results (0.001 seconds)

CVSS: 4.6EPSS: 0%CPEs: 1EXPL: 0

Hitachi IP5000 VOIP WIFI Phone 1.5.6 has a hard-coded administrator password of "0000", which allows attackers with physical access to obtain sensitive information and modify the phone's configuration. • http://marc.info/?l=full-disclosure&m=113217425618951&w=2 http://secunia.com/advisories/17628 http://www.hitachi-cable.co.jp/ICSFiles/infosystem/security/76659792_e.pdf •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

The default index page in the HTTP server in Hitachi IP5000 VOIP WIFI Phone 1.5.6 lists sensitive information such as software versions. • http://marc.info/?l=full-disclosure&m=113217425618951&w=2 http://secunia.com/advisories/17628 http://www.hitachi-cable.co.jp/ICSFiles/infosystem/security/76659792_e.pdf •

CVSS: 5.0EPSS: 0%CPEs: 7EXPL: 0

The default configuration of the HTTP server in Hitachi IP5000 VOIP WIFI Phone 1.5.6 does not require authentication for sensitive configuration pages, which allows remote attackers to modify configuration. • http://marc.info/?l=full-disclosure&m=113217425618951&w=2 http://secunia.com/advisories/17628 http://www.hitachi-cable.co.jp/ICSFiles/infosystem/security/76659792_e.pdf •

CVSS: 7.5EPSS: 1%CPEs: 8EXPL: 0

The SNMP v1/v2c daemon in Hitachi IP5000 VOIP WIFI Phone 1.5.6 allows remote attackers to gain read or write access to system configuration using arbitrary SNMP credentials. • http://marc.info/?l=full-disclosure&m=113217425618951&w=2 http://secunia.com/advisories/17628 http://www.hitachi-cable.co.jp/ICSFiles/infosystem/security/76659792_e.pdf •

CVSS: 7.5EPSS: 1%CPEs: 1EXPL: 0

Hitachi IP5000 VOIP WIFI Phone 1.5.6 does not allow the user to disable access to (1) SNMP or (2) TCP port 3390, which allows remote attackers to modify configuration using CVE-2005-3722, or access the Unidata Shell to obtain sensitive information or cause a denial of service. • http://marc.info/?l=full-disclosure&m=113217425618951&w=2 http://secunia.com/advisories/17628 http://www.hitachi-cable.co.jp/ICSFiles/infosystem/security/76659792_e.pdf •