Subscribe via feed.

FibeAir IP-10 Authentication Bypass

Posted by deepcore on June 16, 2016 – 10:46 pm

FibeAir IP-10 devices do not properly ensure that a user has authenticated before granting them access to the web interface of the device. The attacker simply needs to add a cookie to their session named “ALBATROSS” with the value “0-4-11”.


This post is under “exploit” and has no respond so far.
If you enjoy this article, make sure you subscribe to my RSS Feed.

Post a reply

You must be logged in to post a comment.