Files
CVEs-PoC/2012/CVE-2012-6611.md
T
2024-06-18 02:51:15 +02:00

19 lines
885 B
Markdown

### [CVE-2012-6611](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6611)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
An issue was discovered in Polycom Web Management Interface G3/HDX 8000 HD with Durango 2.6.0 4740 software and embedded Polycom Linux Development Platform 2.14.g3. It has a blank administrative password by default, and can be successfully used without setting this password.
### POC
#### Reference
- https://web.archive.org/web/20130320033016/http://blog.tempest.com.br/joao-paulo-campello/path-traversal-on-polycom-web-management-interface.html
- https://www.exploit-db.com/exploits/43032
#### Github
No PoCs found on GitHub currently.