CVE-2013-3542
11.12.2019, 19:15
Grandstream GXV3501, GXV3504, GXV3601, GXV3601HD/LL, GXV3611HD/LL, GXV3615W/P, GXV3651FHD, GXV3662HD, GXV3615WP_HD, GXV3500, and possibly other camera models with firmware 1.0.4.11, have a hardcoded account "!#/" with the same password, which makes it easier for remote attackers to obtain access via a TELNET session.Enginsight
Vendor | Product | Version |
---|---|---|
grandstream | gxv3501_firmware | 1.0.4.11 |
grandstream | gxv3504_firmware | 1.0.4.11 |
grandstream | gxv3601_firmware | 1.0.4.11 |
grandstream | gxv3601hd_firmware | 1.0.4.11 |
grandstream | gxv3601ll_firmware | 1.0.4.11 |
grandstream | gxv3611hd_firmware | 1.0.4.11 |
grandstream | gxv3611ll_firmware | 1.0.4.11 |
grandstream | gxv3615w_firmware | 1.0.4.11 |
grandstream | gxv3615p_firmware | 1.0.4.11 |
grandstream | gxv3651fhd_firmware | 1.0.4.11 |
grandstream | gxv3662hd_firmware | 1.0.4.11 |
grandstream | gxv3615wp_hd_firmware | 1.0.4.11 |
grandstream | gxv3500_firmware | 1.0.4.11 |
𝑥
= Vulnerable software versions