Vulnerability Details : CVE-2006-3561
Potential exploit
BT Voyager 2091 Wireless firmware 2.21.05.08m_A2pB018c1.d16d and earlier, and 3.01m and earlier, allow remote attackers to bypass the authentication process and gain sensitive information, such as configuration information via (1) /btvoyager_getconfig.sh, PPP credentials via (2) btvoyager_getpppcreds.sh, and decode configuration credentials via (3) btvoyager_decoder.c.
Vulnerability category: Information leak
Products affected by CVE-2006-3561
- cpe:2.3:h:bt:voyager_2091_wireless_adsl_router:*:*:*:*:*:*:*:*
- cpe:2.3:h:bt:voyager_2091_wireless_adsl_router:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2006-3561
3.86%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 92 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2006-3561
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:P/I:N/A:N |
10.0
|
2.9
|
NIST |
CWE ids for CVE-2006-3561
-
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.Assigned by: nvd@nist.gov (Primary)
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2006-3561
-
http://www.securityfocus.com/archive/1/489009/100/0/threaded
-
http://www.gnucitizen.org/projects/router-hacking-challenge/
Page not found ยท GitHub Pages
-
http://www.vupen.com/english/advisories/2006/2734
-
http://www.securityfocus.com/archive/1/440405/100/0/threaded
-
http://ikwt.dyndns.org/projects/btvoyager-getconfig.txt
Exploit
-
http://lists.grok.org.uk/pipermail/full-disclosure/2006-July/047733.html
-
http://www.securityfocus.com/bid/19057
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/27652
-
http://www.gnucitizen.org/blog/holes-in-embedded-devices-authentication-bypass-pt-3/
Jump to