Improper physical access control and use of hard-coded credentials in /etc/passwd permits an attacker with physical access to obtain a root shell via an unprotected UART port on the device. The same port exposes an unauthenticated Das U-Boot BIOS shell.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
phicomm k2_firmware |
||
phicomm k3_firmware |
||
phicomm k3c_firmware |
||
phicomm k2g_firmware |
||
phicomm k2p_firmware |