header-logo
Suggest Exploit
vendor:
Wireless 8760 Dual-Radio 11a/b/g PoE Access Point
by:
SecurityFocus
7.5
CVSS
HIGH
HTML-injection and authentication-bypass
79, 287
CWE
Product Name: Wireless 8760 Dual-Radio 11a/b/g PoE Access Point
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: YES
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2008

3Com Wireless 8760 Dual-Radio 11a/b/g PoE Access Point Multiple Security Vulnerabilities

Successfully exploiting these issues will allow an attacker to obtain administrative credentials, bypass security mechanisms, or run attacker-supplied HTML and script code in the context of the web administration interface. The attacker may then be able to steal cookie-based authentication credentials or control how the site is rendered to the user; other attacks are also possible.

Mitigation:

Ensure that all system components and software are kept up-to-date with the latest vendor-supplied patches. Disable unnecessary services and protocols. Restrict access to the device to trusted/authorized systems only. Monitor the network for any suspicious activity.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/32358/info

3Com Wireless 8760 Dual-Radio 11a/b/g PoE Access Point is prone to multiple security vulnerabilities, including an HTML-injection issue and an authentication-bypass issue.

Successfully exploiting these issues will allow an attacker to obtain administrative credentials, bypass security mechanisms, or run attacker-supplied HTML and script code in the context of the web administration interface. The attacker may then be able to steal cookie-based authentication credentials or control how the site is rendered to the user; other attacks are also possible. 

snmpset -v2c -c private 192.168.1.1 sysName.0 s "PAYLOAD_GOES_HERE"