|ID||CVSS||Summary||Last (major) update||Published|
/bin/login.php in the Web Panel on the Airtame HDMI dongle with firmware before 3.0 allows an attacker to set his own session id via a "Cookie: PHPSESSID=" header. This can be used to achieve persistent access to the admin panel even after an admin p
|07-11-2017 - 18:03||15-10-2017 - 03:29|
AIRTAME HDMI dongle with firmware before 2.2.0 allows unauthenticated access to a big part of the management interface. It is possible to extract all information including the Wi-Fi password, reboot, or force a software update at an arbitrary time.
|03-10-2019 - 00:03||05-04-2017 - 23:59|