CVE-2005-1680

Loading...

General

Score:7.5/10.0
Severity:High
Category:N/A

Impact Metrics

Confidentiality:Partial
Integrity:Partial
Availability:Partial

Exploitability Metrics

Access Vector:Network
Access Complexity:Low
Authentication:None

Published on 20/05/05 - Updated on 18/10/16

Description

D-Link DSL-502T, DSL-504T, DSL-562T, and DSL-G604T, when /cgi-bin/firmwarecfg is executed, allows remote attackers to bypass authentication (1) if their IP address already exists in /var/tmp/fw_ip or (2) if their request is the first, which causes /var/tmp/fw_ip to be created and contain their IP address.

Category:

There is insufficient information about the issue to classify it; details are unknown or unspecified.

Security Notices

US National Vulnerability DatabaseCVE-2005-1680

Exploits

No exploits available for this CVE in our database.

Relative technologies

VendorProduct
d-linkdsl-502t
d-linkdsl-504t
d-linkdsl-562t
d-linkdsl-g604t

Share this vulnerability with:

Twitter Facebook LinkedIn Mail