FibeAir IP-10 Authentication Bypass

Discussion in 'News Aggregator' started by Packet Storm, 16 Jun 2016.

  1. Packet Storm

    Packet Storm Guest

    FibeAir IP-10 devices do not properly ensure that a user has authenticated before granting them access to the web interface of the device. The attacker simply needs to add a cookie to their session named "ALBATROSS" with the value "0-4-11".

    Continue reading...
     

Share This Page

Loading...