CVE-2005-0112
Summary
| CVE | CVE-2005-0112 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2005-04-14 04:00:00 UTC |
| Updated | 2017-07-11 01:32:00 UTC |
| Description | The web-based administrative interface for 3Com OfficeConnect Wireless 11g Access Point (AP) 1.00.08, and possibly earlier versions before 1.03.07A, allows remote attackers to bypass authentication and obtain sensitive information by directly accessing the (1) config.bin (2) profile.wlp?PN=ggg or (3) event.logs URLs. |
Risk And Classification
Problem Types: NVD-CWE-Other
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Hardware | 3com | 3crwe454g72 | 1.0.2 | All | All | All |
| Hardware | 3com | 3crwe454g72 | 1.0.2.11 | All | All | All |
| Hardware | 3com | 3crwe454g72 | 1.0.3.5 | All | All | All |
| Hardware | 3com | 3crwe454g72 | 1.0.2 | All | All | All |
| Hardware | 3com | 3crwe454g72 | 1.0.2.11 | All | All | All |
| Hardware | 3com | 3crwe454g72 | 1.0.3.5 | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| 3Com OfficeConnect Wireless 11g Access Point 3CRWE454G72 Information Disclosure Vulnerability | BID | www.securityfocus.com | Patch, Vendor Advisory |
| IBM X-Force Exchange | XF | exchange.xforce.ibmcloud.com | |
| Secunia - Advisories - OfficeConnect Wireless 11g Access Point Information Disclosure | SECUNIA | secunia.com | |
| SecurityTracker.com Archives - 3Com OfficeConnect Wireless 11g Access Point Discloses Passwords and Keys to Remote Users | SECTRACK | securitytracker.com | |
| Accenture | Let there be change | IDEFENSE | www.idefense.com | Vendor Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.