![]() |
Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | ||
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.108647 |
Categoría: | Default Accounts |
Título: | TELESTAR-DIGITAL GmbH Multiple Internet Radio Undocumented Telnet Service / Default Credentials (Telnet) |
Resumen: | The internet radio products of TELESTAR-DIGITAL GmbH have an undocumented Telnet service; with default credentials enabled. |
Descripción: | Summary: The internet radio products of TELESTAR-DIGITAL GmbH have an undocumented Telnet service with default credentials enabled. Vulnerability Insight: It was possible to login with the telnet credentials 'root:password'. Vulnerability Impact: This issue may only be exploited by an attacker a root shell on the device. Affected Software/OS: TELESTAR Bobs Rock Radio, Dabman D10, Dabman i30 Stereo, Imperial i110, Imperial i150, Imperial i200, Imperial i200-cd, Imperial i400, Imperial i450, Imperial i500-bt, and Imperial i600 devices are known to be affected. Other devices and vendors might be affected as well. Solution: The vendor has released the firmware update TN81HH96-g102h-g103**a*-fb21a-3624 which is disabling the telnet service and removing the default password. CVSS Score: 10.0 CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C |
Referencia Cruzada: |
Common Vulnerability Exposure (CVE) ID: CVE-2019-13473 http://seclists.org/fulldisclosure/2023/Sep/1 http://packetstormsecurity.com/files/154416/Dabman-And-Imperial-Web-Radio-Devices-Undocumented-Telnet-Backdoor.html http://packetstormsecurity.com/files/174503/Internet-Radio-auna-IR-160-SE-UIProto-DoS-XSS-Missing-Authentication.html https://www.vulnerability-lab.com/get_content.php?id=2183 |
Copyright | Copyright (C) 2019 Greenbone Networks GmbH |
Esta es sólo una de 146377 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |