CVE-2018-10024
11.04.2018, 17:29
ubiQuoss Switch VP5208A creates a bcm_password file at /cgi-bin/ with the user credentials in cleartext when a failed login attempt occurs. The file can be reached via an HTTP request. The credentials can be used to access the system via SSH (or TELNET if it is enabled).Enginsight
Vendor | Product | Version |
---|---|---|
ubiquoss | vp5208a_firmware | - |
𝑥
= Vulnerable software versions
Common Weakness Enumeration