exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 7 of 7 RSS Feed

Files from Ian Ling

Email addressiancling at gmail.com
First Active2016-06-15
Last Active2017-05-19
Ceragon FibeAir IP-10 7.2.0 Hidden User Backdoor
Posted May 19, 2017
Authored by Ian Ling

Ceragon FibeAir IP-10 versions 7.2.0 and below suffer from a hidden user backdoor vulnerability.

tags | exploit
advisories | CVE-2015-0936
SHA-256 | 19d0253d67bfd5628b69787c405f7a3c2992c6236010db3ca5711b8a3408d169
Mimosa DoS / Code Execution / File Disclosure
Posted May 12, 2017
Authored by Ian Ling

Various Mimosa products suffer from denial of service, information leakage, code execution, and file disclosure vulnerabilities.

tags | advisory, denial of service, vulnerability, code execution, info disclosure
SHA-256 | 7a6b33948781fb136bf41b92bc58cc0a1e46942a8f3b19bcf9a9eab576873d05
DragonWave Horizon 1.01.03 Hardcoded Credentials
Posted Apr 6, 2017
Authored by Ian Ling

DragonWave Horizon version 1.01.03 suffers from having hardcoded credentials embedded in the device.

tags | advisory
SHA-256 | 07fb435be21a3d69e7b704cc6f1844bf8bd4a0b4dcbf64c0fbf09ed42effb437
Siklu EtherHaul Remote Command Execution
Posted Feb 24, 2017
Authored by Ian Ling

Siklu Etherhaul versions prior to 7.4.0 suffer from an unauthenticated remote command execution vulnerability.

tags | advisory, remote
SHA-256 | 1488db4819cb3d631d5458d8303eb2a66ace7ffc1a16fa5a512858691028f7ce
Trango Altum AC600 Default Root Login
Posted Jan 7, 2017
Authored by Ian Ling

Trango Altum AC600 suffers from a default root login backdoor vulnerability.

tags | exploit, root
SHA-256 | 44c364ece0c707809a6bd70b0e278c8be47ae538016c0266fb8f58dba9877a03
Trango Systems Backdoor Root Account
Posted Nov 12, 2016
Authored by Ian Ling

Trango devices all have a built-in, hidden root account, with a default password that is the same across many devices and software revisions. This account is accessible via ssh and grants access to the underlying embedded unix OS on the device, allowing full control over it. Recent software updates for some models have changed this password, but have not removed this backdoor.

tags | exploit, root
systems | unix
SHA-256 | 986abf819296c00b665c64e80363c5675da033cc02cc865611fe61a308c341d2
FibeAir IP-10 Authentication Bypass
Posted Jun 15, 2016
Authored by Ian Ling

FibeAir IP-10 devices do not properly ensure that a user has authenticated before granting them access to the web interface of the device. The attacker simply needs to add a cookie to their session named "ALBATROSS" with the value "0-4-11".

tags | exploit, web, bypass
SHA-256 | ba7a5b7f1fb1761939ce81f563c29620f9f70fcbfab7ade4b67161271701849e
Page 1 of 1
Back1Next

File Archive:

November 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    16 Files
  • 2
    Nov 2nd
    17 Files
  • 3
    Nov 3rd
    17 Files
  • 4
    Nov 4th
    11 Files
  • 5
    Nov 5th
    0 Files
  • 6
    Nov 6th
    0 Files
  • 7
    Nov 7th
    3 Files
  • 8
    Nov 8th
    59 Files
  • 9
    Nov 9th
    12 Files
  • 10
    Nov 10th
    6 Files
  • 11
    Nov 11th
    11 Files
  • 12
    Nov 12th
    1 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    9 Files
  • 15
    Nov 15th
    33 Files
  • 16
    Nov 16th
    53 Files
  • 17
    Nov 17th
    11 Files
  • 18
    Nov 18th
    14 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    26 Files
  • 22
    Nov 22nd
    22 Files
  • 23
    Nov 23rd
    10 Files
  • 24
    Nov 24th
    9 Files
  • 25
    Nov 25th
    11 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    20 Files
  • 29
    Nov 29th
    9 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close