CVE-2005-3719
https://notcve.org/view.php?id=CVE-2005-3719
Hitachi IP5000 VOIP WIFI Phone 1.5.6 has a hard-coded administrator password of "0000", which allows attackers with physical access to obtain sensitive information and modify the phone's configuration. • http://marc.info/?l=full-disclosure&m=113217425618951&w=2 http://secunia.com/advisories/17628 http://www.hitachi-cable.co.jp/ICSFiles/infosystem/security/76659792_e.pdf •
CVE-2005-3720
https://notcve.org/view.php?id=CVE-2005-3720
The default index page in the HTTP server in Hitachi IP5000 VOIP WIFI Phone 1.5.6 lists sensitive information such as software versions. • http://marc.info/?l=full-disclosure&m=113217425618951&w=2 http://secunia.com/advisories/17628 http://www.hitachi-cable.co.jp/ICSFiles/infosystem/security/76659792_e.pdf •
CVE-2005-3721
https://notcve.org/view.php?id=CVE-2005-3721
The default configuration of the HTTP server in Hitachi IP5000 VOIP WIFI Phone 1.5.6 does not require authentication for sensitive configuration pages, which allows remote attackers to modify configuration. • http://marc.info/?l=full-disclosure&m=113217425618951&w=2 http://secunia.com/advisories/17628 http://www.hitachi-cable.co.jp/ICSFiles/infosystem/security/76659792_e.pdf •
CVE-2005-3722
https://notcve.org/view.php?id=CVE-2005-3722
The SNMP v1/v2c daemon in Hitachi IP5000 VOIP WIFI Phone 1.5.6 allows remote attackers to gain read or write access to system configuration using arbitrary SNMP credentials. • http://marc.info/?l=full-disclosure&m=113217425618951&w=2 http://secunia.com/advisories/17628 http://www.hitachi-cable.co.jp/ICSFiles/infosystem/security/76659792_e.pdf •
CVE-2005-3723
https://notcve.org/view.php?id=CVE-2005-3723
Hitachi IP5000 VOIP WIFI Phone 1.5.6 does not allow the user to disable access to (1) SNMP or (2) TCP port 3390, which allows remote attackers to modify configuration using CVE-2005-3722, or access the Unidata Shell to obtain sensitive information or cause a denial of service. • http://marc.info/?l=full-disclosure&m=113217425618951&w=2 http://secunia.com/advisories/17628 http://www.hitachi-cable.co.jp/ICSFiles/infosystem/security/76659792_e.pdf •