First published: Thu Mar 19 2020(Updated: )
D-Link DSL-2875AL devices through 1.00.05 are prone to password disclosure via a simple crafted /romfile.cfg request to the web management server. This request doesn't require any authentication and will lead to saving the configuration file. The password is stored in cleartext.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
D-link Dsl-2875al Firmware | <=1.00.05 | |
Dlink Dsl-2875al | ||
Dlink Dsl-2875al Firmware | <=1.00.05 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-15655 is classified as a high severity vulnerability due to its potential for password disclosure.
To fix CVE-2019-15655, upgrade the firmware of the D-Link DSL-2875AL device to a version later than 1.00.05.
CVE-2019-15655 exposes the device's configuration file which includes user passwords stored in cleartext.
No, CVE-2019-15655 can be exploited without any authentication, making it particularly dangerous.
CVE-2019-15655 affects D-Link DSL-2875AL devices running firmware version 1.00.05 or earlier.