Логотип exploitDog
bind:CVE-2003-1264
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2003-1264

Количество 2

Количество 2

nvd логотип

CVE-2003-1264

около 22 лет назад

TFTP server in Longshine Wireless Access Point (WAP) LCS-883R-AC-B, and in D-Link DI-614+ 2.0 which is based on it, allows remote attackers to obtain the WEP secret and gain administrator privileges by downloading the configuration file (config.img) and other files without authentication.

CVSS2: 5
EPSS: Низкий
github логотип

GHSA-3645-c3p7-mxq3

почти 4 года назад

TFTP server in Longshine Wireless Access Point (WAP) LCS-883R-AC-B, and in D-Link DI-614+ 2.0 which is based on it, allows remote attackers to obtain the WEP secret and gain administrator privileges by downloading the configuration file (config.img) and other files without authentication.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2003-1264

TFTP server in Longshine Wireless Access Point (WAP) LCS-883R-AC-B, and in D-Link DI-614+ 2.0 which is based on it, allows remote attackers to obtain the WEP secret and gain administrator privileges by downloading the configuration file (config.img) and other files without authentication.

CVSS2: 5
1%
Низкий
около 22 лет назад
github логотип
GHSA-3645-c3p7-mxq3

TFTP server in Longshine Wireless Access Point (WAP) LCS-883R-AC-B, and in D-Link DI-614+ 2.0 which is based on it, allows remote attackers to obtain the WEP secret and gain administrator privileges by downloading the configuration file (config.img) and other files without authentication.

1%
Низкий
почти 4 года назад

Уязвимостей на страницу