/bin/login.php in the Web Panel on the Airtame HDMI dongle with firmware prior to 3.0 allows an malicious user to set his own session id via a "Cookie: PHPSESSID=" header. This can be used to achieve persistent access to the admin panel even after an admin password change.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
airtame hdmi_dongle_firmware |