D-Link DSR-150 with firmware before 1.08B44; DSR-150N with firmware before 1.05B64; DSR-250 and DSR-250N with firmware before 1.08B44; and DSR-500, DSR-500N, DSR-1000, and DSR-1000N with firmware before 1.08B77 stores account passwords in cleartext, which allows local users to obtain sensitive information by reading the Users[#]["Password"] fields in /tmp/teamf1.cfg.ascii.
References
Link | Resource |
---|---|
http://www.exploit-db.com/exploits/30061 | Exploit |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
AND |
|
Configuration 8 (hide)
AND |
|
History
No history.
Information
Published : 2013-12-19 04:24
Updated : 2024-02-28 12:00
NVD link : CVE-2013-7005
Mitre link : CVE-2013-7005
CVE.ORG link : CVE-2013-7005
JSON object : View
Products Affected
dlink
- dsr-250
- dsr-1000n_firmware
- dsr-250n_firmware
- dsr-500_firmware
- dsr-500n_firmware
- dsr-150n
- dsr-250n
- dsr-150
- dsr-150_firmware
- dsr-500n
- dsr-1000
- dsr-250_firmware
- dsr-150n_firmware
- dsr-500
- dsr-1000_firmware
- dsr-1000n
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor