D-Link DSL-504T stores usernames and passwords in cleartext in the router configuration file, which allows remote attackers to obtain sensitive information.
References
Link | Resource |
---|---|
http://marc.info/?l=bugtraq&m=111722515805478&w=2 | Exploit Mailing List |
http://marc.info/?l=bugtraq&m=111722515805478&w=2 | Exploit Mailing List |
Configurations
Configuration 1 (hide)
AND |
|
History
20 Nov 2024, 23:58
Type | Values Removed | Values Added |
---|---|---|
References | () http://marc.info/?l=bugtraq&m=111722515805478&w=2 - Exploit, Mailing List |
13 Feb 2024, 16:17
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-312 | |
CVSS |
v2 : v3 : |
v2 : 7.5
v3 : 7.5 |
CPE | cpe:2.3:h:dlink:dsl-504t:-:*:*:*:*:*:*:* cpe:2.3:o:dlink:dsl-504t_firmware:-:*:*:*:*:*:*:* |
|
First Time |
Dlink
Dlink dsl-504t Dlink dsl-504t Firmware |
|
References | (BUGTRAQ) http://marc.info/?l=bugtraq&m=111722515805478&w=2 - Exploit, Mailing List |
Information
Published : 2005-05-26 04:00
Updated : 2024-11-20 23:58
NVD link : CVE-2005-1828
Mitre link : CVE-2005-1828
CVE.ORG link : CVE-2005-1828
JSON object : View
Products Affected
dlink
- dsl-504t
- dsl-504t_firmware
CWE
CWE-312
Cleartext Storage of Sensitive Information