漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
漏洞
N/A
漏洞信息
On BE126 WIFI repeater 1.0 devices, an attacker can log into telnet (which is open by default) with default credentials as root (username:"root" password:"root"). The attacker can make a user that is connected to the repeater click on a malicious link that will log into the telnet and will infect the device with malicious code.
漏洞信息
N/A
漏洞
N/A
漏洞
Gongjin Electronics BE126 WIFI repeater 安全漏洞
漏洞信息
Gongjin Electronics BE126 WIFI repeater是中国共进电子(Gongjin Electronics)公司的一款无线上网中继器。 Gongjin Electronics BE126 WIFI repeater 1.0版本中存在安全漏洞。攻击者可借助默认的证书利用该漏洞以root用户身份登录到telnet。
漏洞信息
N/A
漏洞
N/A