T-Com Speedport Router Brute Force Security Bypass Weakness
BID:23967
Info
T-Com Speedport Router Brute Force Security Bypass Weakness
| Bugtraq ID: | 23967 |
| Class: | Design Error |
| CVE: |
CVE-2007-2649 |
| Remote: | Yes |
| Local: | No |
| Published: | May 14 2007 12:00AM |
| Updated: | May 07 2015 05:39PM |
| Credit: | Michael Domberg is credited with the discovery of this issue. |
| Vulnerable: |
T-Com Speedport W700V (firmware) 0 |
| Not Vulnerable: | |
Discussion
T-Com Speedport Router Brute Force Security Bypass Weakness
T-Com Speedport firmware is prone to a security-bypass weakness because it fails to protect against brute-force attacks.
An attacker can exploit this issue to perform brute-force attacks in an attempt to gain administrative access.
Successful attacks can result in the complete compromise of the affected device.
Speedport w700v is vulnerable; other versions may also be affected.
T-Com Speedport firmware is prone to a security-bypass weakness because it fails to protect against brute-force attacks.
An attacker can exploit this issue to perform brute-force attacks in an attempt to gain administrative access.
Successful attacks can result in the complete compromise of the affected device.
Speedport w700v is vulnerable; other versions may also be affected.
Exploit / POC
T-Com Speedport Router Brute Force Security Bypass Weakness
Currently we are not aware of any exploits for this issue. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
Currently we are not aware of any exploits for this issue. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
Solution / Fix
T-Com Speedport Router Brute Force Security Bypass Weakness
Solution:
Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
Solution:
Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].