CVE-2003-1264

TFTP server in Longshine Wireless Access Point (WAP) LCS-883R-AC-B, and in D-Link DI-614+ 2.0 which is based on it, allows remote attackers to obtain the WEP secret and gain administrator privileges by downloading the configuration file (config.img) and other files without authentication.
Configurations

Configuration 1 (hide)

OR cpe:2.3:h:d-link:di-614\+:2.0:*:*:*:*:*:*:*
cpe:2.3:h:longshine_technologie:longshine_wireless_ethernet_access_point:lcs-883r-ac-b:*:*:*:*:*:*:*

History

20 Nov 2024, 23:46

Type Values Removed Values Added
References () http://www.iss.net/security_center/static/10997.php - () http://www.iss.net/security_center/static/10997.php -
References () http://www.securityfocus.com/archive/1/305344 - Exploit () http://www.securityfocus.com/archive/1/305344 - Exploit
References () http://www.securityfocus.com/archive/1/305391 - Exploit () http://www.securityfocus.com/archive/1/305391 - Exploit
References () http://www.securityfocus.com/bid/6533 - () http://www.securityfocus.com/bid/6533 -
References () http://www.securitytracker.com/id?1005897 - () http://www.securitytracker.com/id?1005897 -

Information

Published : 2003-12-31 05:00

Updated : 2024-11-20 23:46


NVD link : CVE-2003-1264

Mitre link : CVE-2003-1264

CVE.ORG link : CVE-2003-1264


JSON object : View

Products Affected

longshine_technologie

  • longshine_wireless_ethernet_access_point

d-link

  • di-614\+