Description
Information leak in Compaq WL310, and the Orinoco Residential Gateway access point it is based on, uses a system identification string as a default SNMP read/write community string, which allows remote attackers to obtain and modify sensitive configuration information by querying for the identification string.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by Foundstone Inc. · textremotehardware
https://www.exploit-db.com/exploits/21699
References (4)
Core 4
Core References
Broken Link mailing-list
x_refsource_vulnwatch
http://archives.neohapsis.com/archives/vulnwatch/2002-q3/0066.html
Broken Link vdb-entry
x_refsource_xf
http://www.iss.net/security_center/static/9810.php
Broken Link mailing-list
x_refsource_vulnwatch
http://archives.neohapsis.com/archives/vulnwatch/2002-q3/0075.html
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/5436
Scores
EPSS
0.0834
EPSS Percentile
92.3%
Details
CWE
CWE-200
Status
published
Products (3)
hpe/compaq_wl310_firmware
proxim/orinoco_rg-1000_firmware
proxim/orinoco_rg-1100_firmware
Published
Aug 12, 2002
Tracked Since
Feb 18, 2026