First published: Wed Dec 31 2003(Updated: )
TFTP server in Longshine Wireless Access Point (WAP) LCS-883R-AC-B, and in D-Link DI-614+ 2.0 which is based on it, allows remote attackers to obtain the WEP secret and gain administrator privileges by downloading the configuration file (config.img) and other files without authentication.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
D-Link DI-614+ | =2.0 | |
Longshine Wireless Ethernet Access Point | =lcs-883r-ac-b |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2003-1264 is considered a critical vulnerability due to its ability to allow remote attackers to gain administrator privileges.
To fix CVE-2003-1264, upgrade the firmware of D-Link DI-614+ to a secure version or implement network access controls to prevent unauthorized access.
CVE-2003-1264 affects the D-Link DI-614+ version 2.0 and Longshine Wireless Access Point LCS-883R-AC-B.
CVE-2003-1264 exploits a vulnerability in the TFTP server that allows unauthenticated retrieval of sensitive configuration files.
Mitigation for CVE-2003-1264 can include disabling TFTP services and securing network configurations to limit exposure to potential attackers.