CVE-2005-1680

D-Link DSL-502T, DSL-504T, DSL-562T, and DSL-G604T, when /cgi-bin/firmwarecfg is executed, allows remote attackers to bypass authentication (1) if their IP address already exists in /var/tmp/fw_ip or (2) if their request is the first, which causes /var/tmp/fw_ip to be created and contain their IP address.
Configurations

Configuration 1 (hide)

OR cpe:2.3:h:d-link:dsl-502t:*:*:*:*:*:*:*:*
cpe:2.3:h:d-link:dsl-504t:*:*:*:*:*:*:*:*
cpe:2.3:h:d-link:dsl-562t:*:*:*:*:*:*:*:*
cpe:2.3:h:d-link:dsl-g604t:*:*:*:*:*:*:*:*

History

20 Nov 2024, 23:57

Type Values Removed Values Added
References () http://marc.info/?l=bugtraq&m=111652806030943&w=2 - () http://marc.info/?l=bugtraq&m=111652806030943&w=2 -
References () http://www.vupen.com/english/advisories/2005/0573 - () http://www.vupen.com/english/advisories/2005/0573 -

Information

Published : 2005-05-20 04:00

Updated : 2024-11-20 23:57


NVD link : CVE-2005-1680

Mitre link : CVE-2005-1680

CVE.ORG link : CVE-2005-1680


JSON object : View

Products Affected

d-link

  • dsl-504t
  • dsl-562t
  • dsl-502t
  • dsl-g604t