Vulnerabilities
Vulnerable Software
Phoner:  Security Vulnerabilities
The PhonerLite phone before 2.15 provides hashed credentials in a response to an invalid authentication challenge, which makes it easier for remote attackers to obtain access via a brute-force attack, related to a "SIP Digest Leak" issue.
CVSS Score
7.5
EPSS Score
0.021
Published
2020-02-12


Contact Us

Shodan ® - All rights reserved