Grandstream GXV3501, GXV3504, GXV3601, GXV3601HD/LL, GXV3611HD/LL, GXV3615W/P, GXV3651FHD, GXV3662HD, GXV3615WP_HD, GXV3500, and possibly other camera models with firmware 1.0.4.11, have a hardcoded account "!#/" with the same password, which makes it easier for remote attackers to obtain access via a TELNET session.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Grandstream
Subscribe
|
Gxv3500
Subscribe
Gxv3500 Firmware
Subscribe
Gxv3501
Subscribe
Gxv3501 Firmware
Subscribe
Gxv3504
Subscribe
Gxv3504 Firmware
Subscribe
Gxv3601
Subscribe
Gxv3601 Firmware
Subscribe
Gxv3601hd
Subscribe
Gxv3601hd Firmware
Subscribe
Gxv3601ll
Subscribe
Gxv3601ll Firmware
Subscribe
Gxv3611hd
Subscribe
Gxv3611hd Firmware
Subscribe
Gxv3611ll
Subscribe
Gxv3611ll Firmware
Subscribe
Gxv3615p
Subscribe
Gxv3615p Firmware
Subscribe
Gxv3615w
Subscribe
Gxv3615w Firmware
Subscribe
Gxv3615wp Hd
Subscribe
Gxv3615wp Hd Firmware
Subscribe
Gxv3651fhd
Subscribe
Gxv3651fhd Firmware
Subscribe
Gxv3662hd
Subscribe
Gxv3662hd Firmware
Subscribe
|
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2013-3477 | Grandstream GXV3501, GXV3504, GXV3601, GXV3601HD/LL, GXV3611HD/LL, GXV3615W/P, GXV3651FHD, GXV3662HD, GXV3615WP_HD, GXV3500, and possibly other camera models with firmware 1.0.4.11, have a hardcoded account "!#/" with the same password, which makes it easier for remote attackers to obtain access via a TELNET session. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-06T16:14:56.293Z
Reserved: 2013-05-14T00:00:00.000Z
Link: CVE-2013-3542
No data.
Status : Modified
Published: 2019-12-11T19:15:11.407
Modified: 2024-11-21T01:53:51.560
Link: CVE-2013-3542
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD