RabidHamster R2/Extreme 1.65 and earlier uses a small search space of values for the PIN number, which allows remote attackers to obtain the PIN number via a brute force attack.
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Link | Tags |
---|---|
http://secunia.com/advisories/47966 | third party advisory vendor advisory |
http://aluigi.org/adv/r2_1-adv.txt | exploit |
https://exchange.xforce.ibmcloud.com/vulnerabilities/73115 | vdb entry |
http://osvdb.org/79095 | vdb entry |