Grandstream GXV3501, GXV3504, GXV3601, GXV3601HD/LL, GXV3611HD/LL, GXV3615W/P, GXV3651FHD, GXV3662HD, GXV3615WP_HD, GXV3500, and possibly other camera models with firmware 1.0.4.11, have a hardcoded account "!#/" with the same password, which makes it easier for remote malicious users to obtain access via a TELNET session.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
grandstream gxv3501_firmware 1.0.4.11 |
||
grandstream gxv3504_firmware 1.0.4.11 |
||
grandstream gxv3601_firmware 1.0.4.11 |
||
grandstream gxv3601hd_firmware 1.0.4.11 |
||
grandstream gxv3601ll_firmware 1.0.4.11 |
||
grandstream gxv3611hd_firmware 1.0.4.11 |
||
grandstream gxv3611ll_firmware 1.0.4.11 |
||
grandstream gxv3615w_firmware 1.0.4.11 |
||
grandstream gxv3615p_firmware 1.0.4.11 |
||
grandstream gxv3651fhd_firmware 1.0.4.11 |
||
grandstream gxv3662hd_firmware 1.0.4.11 |
||
grandstream gxv3615wp_hd_firmware 1.0.4.11 |
||
grandstream gxv3500_firmware 1.0.4.11 |