D-Link DSL-502T, DSL-504T, DSL-562T, and DSL-G604T, when /cgi-bin/firmwarecfg is executed, allows remote attackers to bypass authentication (1) if their IP address already exists in /var/tmp/fw_ip or (2) if their request is the first, which causes /var/tmp/fw_ip to be created and contain their IP address.
References
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 23:57
Type | Values Removed | Values Added |
---|---|---|
References | () http://marc.info/?l=bugtraq&m=111652806030943&w=2 - | |
References | () http://www.vupen.com/english/advisories/2005/0573 - |
Information
Published : 2005-05-20 04:00
Updated : 2024-11-20 23:57
NVD link : CVE-2005-1680
Mitre link : CVE-2005-1680
CVE.ORG link : CVE-2005-1680
JSON object : View
Products Affected
d-link
- dsl-504t
- dsl-562t
- dsl-502t
- dsl-g604t
CWE