Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
red-m 1050ap lan acess point vulnerabilities and exploits
(subscribe to this query)
890
VMScore
CVE-2002-0393
Buffer overflow in Red-M 1050 (Bluetooth Access Point) management web interface allows remote malicious users to cause a denial of service and possibly execute arbitrary code via a long administration password.
Red-m 1050ap Lan Acess Point
890
VMScore
CVE-2002-0394
Red-M 1050 (Bluetooth Access Point) uses case insensitive passwords, which makes it easier for malicious users to conduct a brute force guessing attack due to the smaller space of possible passwords.
Red-m 1050ap Lan Acess Point
890
VMScore
CVE-2002-0395
The TFTP server for Red-M 1050 (Bluetooth Access Point) can not be disabled and makes it easier for remote malicious users to crack the administration password via brute force methods.
Red-m 1050ap Lan Acess Point
445
VMScore
CVE-2002-0397
Red-M 1050 (Bluetooth Access Point) publicizes its name, IP address, and other information in UDP packets to a broadcast address, which allows any system on the network to obtain potentially sensitive information about the Access Point device by monitoring UDP port 8887.
Red-m 1050ap Lan Acess Point
890
VMScore
CVE-2002-0398
Red-M 1050 (Bluetooth Access Point) PPP server allows bonded users to cause a denial of service and possibly execute arbitrary code via a long user name.
Red-m 1050ap Lan Acess Point
668
VMScore
CVE-2002-0396
The web management server for Red-M 1050 (Bluetooth Access Point) does not use session-based credentials to authenticate users, which allows malicious users to connect to the server from the same IP address as a user who has already established a session.
Red-m 1050ap Lan Acess Point
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-5248
CVE-2024-3110
CVE-2024-5552
CVE-2024-29415
HTML injection
CVE-2024-3095
TCP
type confusion
CVE-2024-1800
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started