Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> CGI abuses >> Grandstream Budgetone Default Password


Vulnerability Assessment Details

Grandstream Budgetone Default Password

Vulnerability Assessment Summary
Searches for the existence of a Grandstream Budgetone default password

Detailed Explanation for this Vulnerability Assessment

The remote Grandstream Budgetone phone appears to have the
default settings for the administrator password. Using this
password a remote attacker can reconfigure the phone to do
anything he desires, for example he can redirect any calls
generated by the SIP phone through a SIP proxy under the
attacker's control.

Risk factor: Medium

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2005 Noam Rathaus

Cables, Connectors

MYLEX ACCELERAID 170 ULTRA160 SCSI RAID 32MB REF. D040474-32NB Raid Controler
$86.1
MYLEX ACCELERAID 170 ULTRA160 SCSI RAID 32MB REF. D040474-32NB Raid Controler pictureDual 2.5 SATA-3 HDD SDD RAID 0 1 External Enclosure 2.5-inch hard disk drive
$33.94
Dual 2.5 SATA-3 HDD SDD RAID 0 1 External Enclosure 2.5-inch hard disk drive pictureSerial SATA ATA RAID Data HDD Hard Drive Signal Cable Straight Right Angled 45cm
$0.29
Serial SATA ATA RAID Data HDD Hard Drive Signal Cable Straight Right Angled 45cm pictureIBM ServeRAID MR10i SAS / SATA PCI-E Raid Controller + BBU - 43W4297 / 43W4342
$23.89
IBM ServeRAID MR10i SAS / SATA PCI-E Raid Controller + BBU - 43W4297 / 43W4342 picture


Discussions

No Discussions have been posted on this vulnerability.