← Retour aux CVEs
CVE-2008-1262
N/ADescription
The administration panel on the Airspan WiMax ProST 4.1 antenna with 6.5.38.0 software does not verify authentication credentials, which allows remote attackers to (1) upload malformed firmware or (2) bind the antenna to a different WiMAX base station via unspecified requests to forms under process_adv/.
Details CVE
Score CVSS v3.1N/A
Publie3/10/2008
Derniere modification4/23/2026
Sourcenvd
Observations honeypot0
Produits affectes
airspan:wimax_prost
Faiblesses (CWE)
CWE-287
References
http://airspan4wimax.googlepages.com/(cve@mitre.org)
http://secunia.com/advisories/29265(cve@mitre.org)
http://www.0x000000.com/?i=524(cve@mitre.org)
http://www.gnucitizen.org/projects/router-hacking-challenge/(cve@mitre.org)
http://www.kb.cert.org/vuls/id/248372(cve@mitre.org)
http://www.securityfocus.com/archive/1/489009/100/0/threaded(cve@mitre.org)
http://www.securityfocus.com/bid/28122(cve@mitre.org)
http://www.vupen.com/english/advisories/2008/0802/references(cve@mitre.org)
https://exchange.xforce.ibmcloud.com/vulnerabilities/41052(cve@mitre.org)
http://airspan4wimax.googlepages.com/(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/29265(af854a3a-2127-422b-91ae-364da2661108)
http://www.0x000000.com/?i=524(af854a3a-2127-422b-91ae-364da2661108)
http://www.gnucitizen.org/projects/router-hacking-challenge/(af854a3a-2127-422b-91ae-364da2661108)
http://www.kb.cert.org/vuls/id/248372(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/archive/1/489009/100/0/threaded(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/28122(af854a3a-2127-422b-91ae-364da2661108)
http://www.sharemethods.net/nepal/servlet/open?keeppath=false&aid=29820(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2008/0802/references(af854a3a-2127-422b-91ae-364da2661108)
https://exchange.xforce.ibmcloud.com/vulnerabilities/41052(af854a3a-2127-422b-91ae-364da2661108)
Correlations IOC
Aucune correlation enregistree
This product uses data from the NVD API but is not endorsed or certified by the NVD.