CVE-2018-10024
11.04.2018, 17:29
ubiQuoss Switch VP5208A creates a bcm_password file at /cgi-bin/ with the user credentials in cleartext when a failed login attempt occurs. The file can be reached via an HTTP request. The credentials can be used to access the system via SSH (or TELNET if it is enabled).Enginsight
| Vendor | Product | Version |
|---|---|---|
| ubiquoss | vp5208a_firmware | - |
𝑥
= Vulnerable software versions
Common Weakness Enumeration