D-Link DSL-504T allows remote attackers to bypass authentication and gain privileges, such as upgrade firmware, restart the router or restore a saved configuration, via a direct request to firmwarecfg.
References
Link | Resource |
---|---|
http://marc.info/?l=bugtraq&m=111722515805478&w=2 | Third Party Advisory |
http://secunia.com/advisories/15422 | Broken Link |
http://www.securityfocus.com/bid/13679 | Broken Link Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
AND |
|
History
25 Jan 2024, 21:08
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:dlink:dsl-504t_firmware:1.00b01t16.eu.20040217:*:*:*:*:*:*:* cpe:2.3:h:dlink:dsl-504t:-:*:*:*:*:*:*:* |
|
First Time |
Dlink
Dlink dsl-504t Dlink dsl-504t Firmware |
|
References | (SECUNIA) http://secunia.com/advisories/15422 - Broken Link | |
References | (BUGTRAQ) http://marc.info/?l=bugtraq&m=111722515805478&w=2 - Third Party Advisory | |
References | (BID) http://www.securityfocus.com/bid/13679 - Broken Link, Third Party Advisory, VDB Entry | |
CWE | CWE-425 |
Information
Published : 2005-05-26 04:00
Updated : 2024-02-28 10:42
NVD link : CVE-2005-1827
Mitre link : CVE-2005-1827
CVE.ORG link : CVE-2005-1827
JSON object : View
Products Affected
dlink
- dsl-504t_firmware
- dsl-504t
CWE
CWE-425
Direct Request ('Forced Browsing')