CVE-2016-1559

D-Link DAP-1353 H/W vers. B1 3.15 and earlier, D-Link DAP-2553 H/W ver. A1 1.31 and earlier, and D-Link DAP-3520 H/W ver. A1 1.16 and earlier reveal wireless passwords and administrative usernames and passwords over SNMP.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:d-link:dap-1353_h\/w_b1_firmware:3.15:*:*:*:*:*:*:*
cpe:2.3:h:dlink:dap-1353_h\/w_b1:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:d-link:dap-2553_h\/w_a1_firmware:1.31:*:*:*:*:*:*:*
cpe:2.3:h:dlink:dap-2553_h\/w_a1:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:d-link:dap-3520_h\/w_a1_firmware:1.16:*:*:*:*:*:*:*
cpe:2.3:h:dlink:dap-3520_h\/w_a1:-:*:*:*:*:*:*:*

History

21 Nov 2024, 02:46

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/135956/D-Link-Netgear-FIRMADYNE-Command-Injection-Buffer-Overflow.html - Broken Link, Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/135956/D-Link-Netgear-FIRMADYNE-Command-Injection-Buffer-Overflow.html - Broken Link, Third Party Advisory, VDB Entry
References () http://seclists.org/fulldisclosure/2016/Feb/112 - Mailing List, Third Party Advisory () http://seclists.org/fulldisclosure/2016/Feb/112 - Mailing List, Third Party Advisory
References () http://www.dlink.com/mk/mk/support/support-news/2016/march/16/firmadyne-cve_2016_1558-cve_2016_1559 - Patch, Vendor Advisory () http://www.dlink.com/mk/mk/support/support-news/2016/march/16/firmadyne-cve_2016_1558-cve_2016_1559 - Patch, Vendor Advisory

Information

Published : 2017-04-21 15:59

Updated : 2024-11-21 02:46


NVD link : CVE-2016-1559

Mitre link : CVE-2016-1559

CVE.ORG link : CVE-2016-1559


JSON object : View

Products Affected

d-link

  • dap-1353_h\/w_b1_firmware
  • dap-2553_h\/w_a1_firmware
  • dap-3520_h\/w_a1_firmware

dlink

  • dap-1353_h\/w_b1
  • dap-2553_h\/w_a1
  • dap-3520_h\/w_a1
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor