Local File Inclusion due to path traversal in D-Link DAP-1620 leads to unauthorized internal files reading [/etc/passwd] and [/etc/shadow].
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/167070/DLINK-DAP-1620-A1-1.01-Directory-Traversal.html | Exploit Third Party Advisory VDB Entry |
https://drive.google.com/drive/folders/19OP09msw8l7CJ622nkvnvnt7EKun1eCG?usp=sharing | Exploit Third Party Advisory |
https://www.dlink.com/en/security-bulletin/ | Not Applicable Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
No history.
Information
Published : 2022-03-04 16:15
Updated : 2024-02-28 19:09
NVD link : CVE-2021-46381
Mitre link : CVE-2021-46381
CVE.ORG link : CVE-2021-46381
JSON object : View
Products Affected
dlink
- dap-1620_firmware
- dap-1620
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')