漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
漏洞
N/A
漏洞信息
A hard-coded credentials issue was discovered on Mimosa Client Radios before 2.2.3, Mimosa Backhaul Radios before 2.2.3, and Mimosa Access Points before 2.2.3. These devices run Mosquitto, a lightweight message broker, to send information between devices. By using the vendor's hard-coded credentials to connect to the broker on any device (whether it be an AP, Client, or Backhaul model), an attacker can view all the messages being sent between the devices. If an attacker connects to an AP, the AP will leak information about any clients connected to it, including the serial numbers, which can be used to remotely factory reset the clients via a page in their web interface.
漏洞信息
N/A
漏洞
N/A
漏洞
多款Mimosa产品安全漏洞
漏洞信息
Mimosa Client Radios、Mimosa Backhaul Radios和Mimosa Access Points都是美国Mimosa Networks公司的产品。Mimosa Client Radios是一个Mimosa多点解决方案的客户端设备的管理程序。Mimosa Backhaul Radios是一个宽带回程设备的管理程序。Mimosa Access Points是一个宽带部署设备。 多款Mimosa产品中存在安全漏洞。攻击者可利用该漏洞查看设备之间的发送的信息或获取连接到设备上的客户
漏洞信息
N/A
漏洞
N/A