First published: Tue Dec 31 2002(Updated: )
D-Link DWL-900AP+ Access Point 2.1 and 2.2 allows remote attackers to access the TFTP server without authentication and read the config.img file, which contains sensitive information such as the administrative password, the WEP encryption keys, and network configuration information.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
D-Link DWL-900AP+ | =2.1 | |
D-Link DWL-900AP+ | =2.2 | |
All of | ||
Any of | ||
Dlink DWL-900AP+ Firmware | =2.1 | |
Dlink DWL-900AP+ Firmware | =2.2 | |
D-Link DWL-900AP+ |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2002-1810 is considered high due to the potential exposure of sensitive configuration data.
CVE-2002-1810 allows remote attackers to access the TFTP server without authentication, compromising device security.
To fix CVE-2002-1810, update the firmware of your D-Link DWL-900AP+ to the latest version that addresses this vulnerability.
No, only D-Link DWL-900AP+ versions 2.1 and 2.2 are affected by CVE-2002-1810.
CVE-2002-1810 can expose sensitive information such as the administrative password, WEP encryption keys, and network configuration details.