Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-3645-c3p7-mxq3

Опубликовано: 29 апр. 2022
Источник: github
Github: Не прошло ревью

Описание

TFTP server in Longshine Wireless Access Point (WAP) LCS-883R-AC-B, and in D-Link DI-614+ 2.0 which is based on it, allows remote attackers to obtain the WEP secret and gain administrator privileges by downloading the configuration file (config.img) and other files without authentication.

TFTP server in Longshine Wireless Access Point (WAP) LCS-883R-AC-B, and in D-Link DI-614+ 2.0 which is based on it, allows remote attackers to obtain the WEP secret and gain administrator privileges by downloading the configuration file (config.img) and other files without authentication.

EPSS

Процентиль: 73%
0.00765
Низкий

Связанные уязвимости

nvd
около 22 лет назад

TFTP server in Longshine Wireless Access Point (WAP) LCS-883R-AC-B, and in D-Link DI-614+ 2.0 which is based on it, allows remote attackers to obtain the WEP secret and gain administrator privileges by downloading the configuration file (config.img) and other files without authentication.

EPSS

Процентиль: 73%
0.00765
Низкий