|lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC
Open Source and information security mailing list archives
Date: 21 Jan 2007 13:25:35 -0000 From: jn@....de To: bugtraq@...urityfocus.com Subject: Re: Virginity Security Advisory 2007-001 : T-Com Speedport 500V Login bypass I maintain an alternative firmware for the Speedport series and can confirm the flaw in the following firmwares: Speedport W500V Firmware T-Com 1.30 Speedport 500V Firmware T-Com 1.31 Speedport W500V Firmware mod500 Speedport 500V Firmware mod500 Targa WR500 VoIP Firmware mod500 I'm 99% certain that the original firmware for the Targa is also concerned. CORRECTION White the description of the security flaw is correct, please notice: Installing a new firmware does NOT change the system password!
Powered by blists - more mailing lists