Filtered by vendor Red-m
Subscriptions
Filtered by product 1050ap Lan Acess Point
Subscriptions
Total
6 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2002-0395 | 1 Red-m | 1 1050ap Lan Acess Point | 2024-08-08 | N/A |
The TFTP server for Red-M 1050 (Bluetooth Access Point) can not be disabled and makes it easier for remote attackers to crack the administration password via brute force methods. | ||||
CVE-2002-0398 | 1 Red-m | 1 1050ap Lan Acess Point | 2024-08-08 | N/A |
Red-M 1050 (Bluetooth Access Point) PPP server allows bonded users to cause a denial of service and possibly execute arbitrary code via a long user name. | ||||
CVE-2002-0397 | 1 Red-m | 1 1050ap Lan Acess Point | 2024-08-08 | N/A |
Red-M 1050 (Bluetooth Access Point) publicizes its name, IP address, and other information in UDP packets to a broadcast address, which allows any system on the network to obtain potentially sensitive information about the Access Point device by monitoring UDP port 8887. | ||||
CVE-2002-0394 | 1 Red-m | 1 1050ap Lan Acess Point | 2024-08-08 | N/A |
Red-M 1050 (Bluetooth Access Point) uses case insensitive passwords, which makes it easier for attackers to conduct a brute force guessing attack due to the smaller space of possible passwords. | ||||
CVE-2002-0393 | 1 Red-m | 1 1050ap Lan Acess Point | 2024-08-08 | N/A |
Buffer overflow in Red-M 1050 (Bluetooth Access Point) management web interface allows remote attackers to cause a denial of service and possibly execute arbitrary code via a long administration password. | ||||
CVE-2002-0396 | 1 Red-m | 1 1050ap Lan Acess Point | 2024-08-08 | N/A |
The web management server for Red-M 1050 (Bluetooth Access Point) does not use session-based credentials to authenticate users, which allows attackers to connect to the server from the same IP address as a user who has already established a session. |
Page 1 of 1.