'; echo 'Hillstone Networks'; } elseif ($_SERVER[HTTP_HOST] == "www.huaantech.com.cn") { echo ''; echo 'huaantech'; } elseif ($_SERVER[HTTP_HOST] == "www.dcnetworks.com.cn") { echo ''; echo 'dcnetworks'; } elseif ($_SERVER[HTTP_HOST] == "www.w-ibeda.com") { if (false===strpos($_SERVER[REQUEST_URI],"/en/")) echo ''; else echo ''; echo 'w-ibeda'; } elseif ($_SERVER[HTTP_HOST] == "www.hp-telecom.com") { echo ''; echo 'hp-telecom'; } else{ echo ''; echo 'Hillstone Networks'; } ?>
 
   
 

HTTP Attack (Attack ID:300803)

Release Date:2009-09-27

Attack Name:Login.htm attempt

OS Type

Application Type

Severity:Info

BUG ID

CVE ID

 

Description

A vulnerability in the Diva LAN ISDN Modem allows remote malicious users to lock up the modem requiring a hard reset. The vulnerability manifests itself when a remote users connects to the Diva HTTP port and sends a GET request of the form 'login.html?password='.

 

Solution

Eicon has fixed this problem in their firmware release 2 release 1. The URL for download is available in our 'Credit' section'.