Описание
TFTP server in Longshine Wireless Access Point (WAP) LCS-883R-AC-B, and in D-Link DI-614+ 2.0 which is based on it, allows remote attackers to obtain the WEP secret and gain administrator privileges by downloading the configuration file (config.img) and other files without authentication.
Ссылки
- Exploit
- Exploit
- Exploit
- Exploit
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:h:d-link:di-614\+:2.0:*:*:*:*:*:*:*
cpe:2.3:h:longshine_technologie:longshine_wireless_ethernet_access_point:lcs-883r-ac-b:*:*:*:*:*:*:*
EPSS
Процентиль: 73%
0.00765
Низкий
5 Medium
CVSS2
Дефекты
NVD-CWE-Other
Связанные уязвимости
github
почти 4 года назад
TFTP server in Longshine Wireless Access Point (WAP) LCS-883R-AC-B, and in D-Link DI-614+ 2.0 which is based on it, allows remote attackers to obtain the WEP secret and gain administrator privileges by downloading the configuration file (config.img) and other files without authentication.
EPSS
Процентиль: 73%
0.00765
Низкий
5 Medium
CVSS2
Дефекты
NVD-CWE-Other