Support Us — Your donation helps us keep running

Goal: 1000 CNY,Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2004-2080
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
Red-M Red-Alert 2.7.5 with software 3.1 build 24 converts multiple spaces in a Service Set Identifier (SSID) to a single space, which prevents Red-Alert from correctly identifying the SSID.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Red-M Red-Alert多个远程安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Red-Alert是一款无线(802.11b/Bluetooth)探测,进行监视和安全威胁报告的程序。 Red-Alert存在多个安全问题,远程攻击者可以利用这个漏洞可以进行使设备崩溃,删除日志,访问管理接口等攻击。 具体问题如下: 1、未授权用户通过WEB服务器可使Red-Alert应用程序重启。当浏览器提交的请求超过1230字节,就会导致应用系统重启,所有信息丢失: $ perl -e 'print "a"x1230 . "\r\n\r\n"| nc <device ip> 80 2、探测器管理验证绑
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
-n/a n/a -
II. Public POCs for CVE-2004-2080
#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2004-2080
Please Login to view more intelligence information
New Vulnerabilities
V. Comments for CVE-2004-2080

No comments yet


Leave a comment