Information leak in Compaq WL310, and the Orinoco Residential Gateway access point it is based on, uses a system identification string as a default SNMP read/write community string, which allows remote attackers to obtain and modify sensitive configuration information by querying for the identification string.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/5436 | Third Party Advisory VDB Entry |
http://www.iss.net/security_center/static/9810.php | Broken Link |
http://archives.neohapsis.com/archives/vulnwatch/2002-q3/0066.html | Broken Link |
http://archives.neohapsis.com/archives/vulnwatch/2002-q3/0075.html | Broken Link |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Information
Published : 2002-08-11 21:00
Updated : 2020-12-09 07:01
NVD link : CVE-2002-0812
Mitre link : CVE-2002-0812
JSON object : View
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
Products Affected
proxim
- orinoco_rg-1000
- orinoco_rg-1100
- orinoco_rg-1100_firmware
- orinoco_rg-1000_firmware
hpe
- compaq_wl310_firmware
- compaq_wl310