D-Link DSL-502T, DSL-504T, DSL-562T, and DSL-G604T, when /cgi-bin/firmwarecfg is executed, allows remote attackers to bypass authentication (1) if their IP address already exists in /var/tmp/fw_ip or (2) if their request is the first, which causes /var/tmp/fw_ip to be created and contain their IP address.
Max CVSS
7.5
EPSS Score
0.49%
Published
2005-05-20
Updated
2016-10-18
D-Link DSL-504T allows remote attackers to bypass authentication and gain privileges, such as upgrade firmware, restart the router or restore a saved configuration, via a direct request to firmwarecfg.
Max CVSS
7.5
EPSS Score
1.07%
Published
2005-05-26
Updated
2024-01-25
2 vulnerabilities found