TFTP server in Longshine Wireless Access Point (WAP) LCS-883R-AC-B, and in D-Link DI-614+ 2.0 which is based on it, allows remote attackers to obtain the WEP secret and gain administrator privileges by downloading the configuration file (config.img) and other files without authentication.
References
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 23:46
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.iss.net/security_center/static/10997.php - | |
References | () http://www.securityfocus.com/archive/1/305344 - Exploit | |
References | () http://www.securityfocus.com/archive/1/305391 - Exploit | |
References | () http://www.securityfocus.com/bid/6533 - | |
References | () http://www.securitytracker.com/id?1005897 - |
Information
Published : 2003-12-31 05:00
Updated : 2024-11-20 23:46
NVD link : CVE-2003-1264
Mitre link : CVE-2003-1264
CVE.ORG link : CVE-2003-1264
JSON object : View
Products Affected
longshine_technologie
- longshine_wireless_ethernet_access_point
d-link
- di-614\+
CWE