Auerswald COMfortel 1400 IP and 2600 IP before 2.8G devices allow Authentication Bypass via the /about/../ substring.
References
Link | Resource |
---|---|
https://www.redteam-pentesting.de/en/advisories/-advisories-publicised-vulnerability-analyses | Exploit Third Party Advisory |
http://packetstormsecurity.com/files/165162/Auerswald-COMfortel-1400-2600-3600-IP-2.8F-Authentication-Bypass.html | Exploit Third Party Advisory VDB Entry |
https://www.redteam-pentesting.de/en/advisories/rt-sa-2021-004/-auerswald-comfortel-1400-2600-3600-ip-authentication-bypass | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Information
Published : 2021-12-12 20:15
Updated : 2022-07-12 10:42
NVD link : CVE-2021-40856
Mitre link : CVE-2021-40856
JSON object : View
CWE
CWE-706
Use of Incorrectly-Resolved Name or Reference
Products Affected
auerswald
- comfortel_1400_ip_firmware
- comfortel_2600_ip_firmware
- comfortel_3600_ip
- comfortel_1400_ip
- comfortel_2600_ip
- comfortel_3600_ip_firmware