First published: Sat Jan 22 2005(Updated: )
The web-based administrative interface for 3Com OfficeConnect Wireless 11g Access Point (AP) 1.00.08, and possibly earlier versions before 1.03.07A, allows remote attackers to bypass authentication and obtain sensitive information by directly accessing the (1) config.bin (2) profile.wlp?PN=ggg or (3) event.logs URLs.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
3com 3crwe454g72 | =1.0.2 | |
3com 3crwe454g72 | =1.0.2.11 | |
3com 3crwe454g72 | =1.0.3.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-0112 is considered a high severity vulnerability due to the potential for remote attackers to gain unauthorized access to sensitive information.
To fix CVE-2005-0112, you should update the firmware of the 3Com OfficeConnect Wireless 11g Access Point to version 1.03.07A or later.
CVE-2005-0112 affects the 3Com OfficeConnect Wireless 11g Access Point, specifically versions 1.00.08 and earlier.
The impact of CVE-2005-0112 includes the ability for remote attackers to bypass authentication and access sensitive configuration files.
Any users or organizations utilizing the vulnerable versions of the 3Com OfficeConnect Wireless 11g Access Point are at risk from CVE-2005-0112.