D-Link DSL-502T, DSL-504T, DSL-562T, and DSL-G604T, when /cgi-bin/firmwarecfg is executed, allows remote attackers to bypass authentication (1) if their IP address already exists in /var/tmp/fw_ip or (2) if their request is the first, which causes /var/tmp/fw_ip to be created and contain their IP address.
Max CVSS
7.5
EPSS Score
0.49%
Published
2005-05-20
Updated
2016-10-18
Directory traversal vulnerability in webcm in the D-Link DSL-G604T Wireless ADSL Router Modem allows remote attackers to read arbitrary files via an absolute path in the getpage parameter.
Max CVSS
5.0
EPSS Score
0.62%
Published
2006-05-12
Updated
2018-10-18
Cross-site scripting (XSS) vulnerability in cgi-bin/webcm on the D-Link DSL-G604T router allows remote attackers to inject arbitrary web script or HTML via the var:category parameter, as demonstrated by a request for advanced/portforw.htm on the fwan page.
Max CVSS
4.3
EPSS Score
0.36%
Published
2008-03-10
Updated
2018-10-11
3 vulnerabilities found