speedguide.net  

Port 5401 Details


known port assignments and vulnerabilities
threat/application/port search:
 search
Port(s) Protocol Service Details Source
5401 tcp excerpts Trojans that use this port: Back Construction, Blade Runner, Digital Spy , Mneah

Cisco Security Agent could allow a remote attacker to upload arbitrary files, caused by the improper validation of file extensions by the Management Center web interface (webagent.exe). By sending a specially-crafted POST request over port 5401 TCP, a remote attacker could exploit this vulnerability to upload a malicious PHP script, which could allow the attacker to execute arbitrary PHP code on the vulnerable system.
References: [CVE-2011-0364] [EDB-17155] [XFDB-65436]

A vulnerability has been identified in SiNVR 3 Central Control Server (CCS) (all versions), SiNVR 3 Video Server (all versions). The HTTP service (default port 5401/tcp) of the SiNVR 3 Video Server contains an authentication bypass vulnerability, even when properly configured with enforced authentication. A remote attacker with network access to the Video Server could exploit this vulnerability to read the SiNVR users database, including the passwords of all users in obfuscated cleartext.
References: [CVE-2019-18339]

Port is also IANA registered for:
5401/tcp Excerpt Search Secure
SG
5401 tcp trojan Back Construction, Blade Runner, Digital Spy , Mneah Trojans
5401 tcp BackConstruction [trojan] Back Construction SANS
5401 tcp BladeRunner [trojan] Blade Runner SANS
5401 tcp Mneah [trojan] Mneah SANS
5401 tcp,udp excerpts Excerpt Search Secure IANA
6 records found

Related ports: 5400  5402  

News Glossary of Terms FAQs Cool Links SpeedGuide Teams SG Premium Services SG Gear Store
Registry Tweaks Broadband Tools Downloads/Patches Broadband Hardware SG Ports Database Security Default Passwords User Stories
Broadband Security Editorials General User Articles Quick Reference
Broadband Forums General Discussions
Advertising Awards Link to us Server Statistics Helping SG About