First published: Wed Oct 17 2018(Updated: )
An issue was discovered on D-Link DWR-116 through 1.06, DIR-140L through 1.02, DIR-640L through 1.02, DWR-512 through 2.02, DWR-712 through 2.02, DWR-912 through 2.02, DWR-921 through 2.02, and DWR-111 through 1.01 devices. The administrative password is stored in plaintext in the /tmp/csman/0 file. An attacker having a directory traversal (or LFI) can easily get full router access.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Dlink Dwr-116 Firmware | <=1.06 | |
Dlink Dwr-116 | ||
Dlink Dir-140l Firmware | <=1.02 | |
Dlink Dir-140l | ||
Dlink Dir-640l Firmware | <=1.02 | |
Dlink Dir-640l | ||
Dlink Dwr-512 Firmware | <=2.02 | |
Dlink Dwr-512 | ||
Dlink Dwr-712 Firmware | <=2.02 | |
Dlink Dwr-712 | ||
Dlink Dwr-912 Firmware | <=2.02 | |
D-link Dwr-921 | ||
Dlink Dwr-921 Firmware | <=2.02 | |
Dlink Dwr-921 | ||
Dlink Dwr-111 Firmware | <=1.01 | |
Dlink Dwr-111 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.