Description
The web administration interface on Amped Wireless R10000 devices with firmware 2.5.2.11 has a default password of admin for the admin account, which allows remote attackers to obtain administrative privileges by leveraging a LAN session.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2015-7208 | The web administration interface on Amped Wireless R10000 devices with firmware 2.5.2.11 has a default password of admin for the admin account, which allows remote attackers to obtain administrative privileges by leveraging a LAN session. |
References
History
No history.
Status: PUBLISHED
Assigner: certcc
Published:
Updated: 2024-08-06T07:43:46.161Z
Reserved: 2015-09-18T00:00:00.000Z
Link: CVE-2015-7277
No data.
Status : Modified
Published: 2015-12-31T05:59:19.493
Modified: 2026-05-06T22:30:45.220
Link: CVE-2015-7277
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD