Red-m » 1050ap Lan Acess Point : Security Vulnerabilities, CVEs, CVSS score >= 5
Red-M 1050 (Bluetooth Access Point) PPP server allows bonded users to cause a denial of service and possibly execute arbitrary code via a long user name.
Max CVSS
10.0
EPSS Score
0.57%
Published
2002-07-26
Updated
2017-10-10
Red-M 1050 (Bluetooth Access Point) publicizes its name, IP address, and other information in UDP packets to a broadcast address, which allows any system on the network to obtain potentially sensitive information about the Access Point device by monitoring UDP port 8887.
Max CVSS
5.0
EPSS Score
0.23%
Published
2002-07-26
Updated
2017-10-10
The web management server for Red-M 1050 (Bluetooth Access Point) does not use session-based credentials to authenticate users, which allows attackers to connect to the server from the same IP address as a user who has already established a session.
Max CVSS
7.5
EPSS Score
0.48%
Published
2002-07-26
Updated
2017-10-10
The TFTP server for Red-M 1050 (Bluetooth Access Point) can not be disabled and makes it easier for remote attackers to crack the administration password via brute force methods.
Max CVSS
10.0
EPSS Score
0.53%
Published
2002-07-26
Updated
2017-10-10
Red-M 1050 (Bluetooth Access Point) uses case insensitive passwords, which makes it easier for attackers to conduct a brute force guessing attack due to the smaller space of possible passwords.
Max CVSS
10.0
EPSS Score
0.18%
Published
2002-07-26
Updated
2008-09-05
Buffer overflow in Red-M 1050 (Bluetooth Access Point) management web interface allows remote attackers to cause a denial of service and possibly execute arbitrary code via a long administration password.
Max CVSS
10.0
EPSS Score
2.66%
Published
2002-07-26
Updated
2017-07-11
6 vulnerabilities found