Description
/bin/login.php in the Web Panel on the Airtame HDMI dongle with firmware before 3.0 allows an attacker to set his own session id via a "Cookie: PHPSESSID=" header. This can be used to achieve persistent access to the admin panel even after an admin password change.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2017-6760 | /bin/login.php in the Web Panel on the Airtame HDMI dongle with firmware before 3.0 allows an attacker to set his own session id via a "Cookie: PHPSESSID=" header. This can be used to achieve persistent access to the admin panel even after an admin password change. |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-09-16T16:49:04.126Z
Reserved: 2017-10-14T00:00:00.000Z
Link: CVE-2017-15304
No data.
Status : Deferred
Published: 2017-10-15T03:29:00.203
Modified: 2025-04-20T01:37:25.860
Link: CVE-2017-15304
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD