First published: Thu Oct 26 2006(Updated: )
Directory traversal vulnerability in cgi-bin/webcm in D-Link DSL-G624T firmware 3.00B01T01.YA-C.20060616 allows remote attackers to read arbitrary files via a .. (dot dot) in the getpage parameter.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
D-Link DSL-G624T | =firmware_3.00b01t01.ya_c.2006-06-16 | |
=firmware_3.00b01t01.ya_c.2006-06-16 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-5536 is classified as a critical vulnerability due to its potential to allow unauthorized access to sensitive files.
To mitigate CVE-2006-5536, D-Link recommends upgrading to the latest firmware version that addresses the directory traversal vulnerability.
CVE-2006-5536 specifically affects D-Link DSL-G624T with firmware version 3.00B01T01.YA-C.20060616.
Attackers can exploit CVE-2006-5536 using directory traversal techniques to read arbitrary files on the affected device.
Yes, CVE-2006-5536 can be exploited remotely, allowing attackers to gain unauthorized access without physical access to the device.