Right, which the security hole mentioned for 2.14 doesn't even apply to
this method. This isn't a 'security hole' per se, it's just how the
data is stored inside the device.
Vonage is running the latest 2.16-2 firmware. No longer applicable.
cameron.
On Wed, 24 Dec 2003, Doug Shubert wrote:
this security hole has been around for some time
http://www.securiteam.com/securitynews/5PP0G0K75U.html
Lion Templin wrote:
In the process of investigating a Cisco ATA 186 that was locked by
Vonage, I found that you can still unlock the device yourself. But
there's a catch.
The device's design has a great plus: a DIP32 *socketed* SST28SF040A
flash chip. I found an 8 digit unlock code at 0x03FA71-0x03FA78. I do
not know if that is a standard location.
If you have the equipment, you're in luck. But IMHO, the $15 fee is
more than reasonable .. and certainly less than what it would cost to
get a device to read/write these flash chips.
_______________________________________________
Asterisk-Users mailing list
[EMAIL PROTECTED]
http://lists.digium.com/mailman/listinfo/asterisk-users
--
FREE Unlimited Worldwide Voip calling
set-up an account and start saving today!
http://www.voippages.com ext. 1003
http://www.pulver.com/fwd/ ext. 83740
_______________________________________________
Asterisk-Users mailing list
[EMAIL PROTECTED]
http://lists.digium.com/mailman/listinfo/asterisk-users
_______________________________________________
Asterisk-Users mailing list
[EMAIL PROTECTED]
http://lists.digium.com/mailman/listinfo/asterisk-users
--
= lion is Lion J Templin [EMAIL PROTECTED] =
= 612-605-3613 x3001 FWD 94117 =
_______________________________________________
Asterisk-Users mailing list
[EMAIL PROTECTED]
http://lists.digium.com/mailman/listinfo/asterisk-users