[+] Credits: Ian Ling
[+] Website: iancaling.com
[+] Source: http://blog.iancaling.com/post/145309944453/
Vendor:
=
www.siklu.com/
Product:
==
-EtherHaul EH-1200F/FX/TX, EH-2200F/FX, EH-600T/TL
-EtherHaul EH-1200/TL
Vulnerability Type
[+] Credits: Ian Ling
[+] Website: iancaling.com
Vendor:
=
www.ceragon.com
Product:
==
-FibeAir IP-10
Vulnerability Type:
===
Default Root Account
CVE Reference:
==
N/A
Vulnerability Details:
=
Ceragon FibeAir
[+] Credits: Ian Ling
[+] Website: iancaling.com
[+] Source: http://blog.iancaling.com/post/153011925478/
Vendor:
=
www.trangosys.com
Products:
==
All models. Newer versions use a different password.
Vulnerability Type:
===
Default Root
[+] Credits: Ian Ling
[+] Website: iancaling.com
[+] Source: http://blog.iancaling.com/post/155395764003
Vendor:
=
https://www.trangosys.com/
Product:
==
-Altum AC600
Vulnerability Details:
=
Trango Altum AC600′s have a default root login
[+] Credits: Ian Ling
[+] Website: iancaling.com
[+] Source: http://blog.iancaling.com/post/155127766533
Vendor:
=
https://www.siklu.com/
Product:
==
-Siklu EtherHaul (EH-*)
Vulnerability Details:
=
Siklu EtherHaul devices are vulnerable
[+] Credits: Ian Ling
[+] Website: iancaling.com
[+] Source: http://blog.iancaling.com/post/159276197313
Vendor:
=
http://www.dragonwaveinc.com/
Product:
==
-DragonWave Horizon
Vulnerability Details:
=
DragonWave Horizon wireless radios
[+] Credits: Ian Ling
[+] Website: iancaling.com
[+] Source: http://blog.iancaling.com/post/160596244178
Vendor:
=
http://mimosa.co
Products:
==
Access Points (e.g. A5) <2.2.3
Client Radios (e.g. C5) <=2.2.3
Backhaul Radios (e.g. B5) <=2.2.3
Vuln
[+] Credits: Ian Ling
[+] Website: iancaling.com
[+] Source: http://blog.iancaling.com/post/160817658078
Vendor:
=
https://www.ceragon.com
Products:
==
Ceragon FibeAir IP-10 (<=7.2.0) (latest version)
Vulnerability Types:
===
Hidden U