Red-M 1050 (Bluetooth Access Point) PPP server allows bonded users to cause a denial of service and possibly execute arbitrary code via a long user name.
Max CVSS
10.0
EPSS Score
0.57%
Published
2002-07-26
Updated
2017-10-10
Red-M 1050 (Bluetooth Access Point) publicizes its name, IP address, and other information in UDP packets to a broadcast address, which allows any system on the network to obtain potentially sensitive information about the Access Point device by monitoring UDP port 8887.
Max CVSS
5.0
EPSS Score
0.23%
Published
2002-07-26
Updated
2017-10-10
The web management server for Red-M 1050 (Bluetooth Access Point) does not use session-based credentials to authenticate users, which allows attackers to connect to the server from the same IP address as a user who has already established a session.
Max CVSS
7.5
EPSS Score
0.48%
Published
2002-07-26
Updated
2017-10-10
The TFTP server for Red-M 1050 (Bluetooth Access Point) can not be disabled and makes it easier for remote attackers to crack the administration password via brute force methods.
Max CVSS
10.0
EPSS Score
0.53%
Published
2002-07-26
Updated
2017-10-10
Red-M 1050 (Bluetooth Access Point) uses case insensitive passwords, which makes it easier for attackers to conduct a brute force guessing attack due to the smaller space of possible passwords.
Max CVSS
10.0
EPSS Score
0.18%
Published
2002-07-26
Updated
2008-09-05
Buffer overflow in Red-M 1050 (Bluetooth Access Point) management web interface allows remote attackers to cause a denial of service and possibly execute arbitrary code via a long administration password.
Max CVSS
10.0
EPSS Score
2.66%
Published
2002-07-26
Updated
2017-07-11
6 vulnerabilities found
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!