First published: Fri Oct 11 2019(Updated: )
D-Link DAP-1320 A2-V1.21 routers have some web interfaces without authentication requirements, as demonstrated by uplink_info.xml. An attacker can remotely obtain a user's Wi-Fi SSID and password, which could be used to connect to Wi-Fi or perform a dictionary attack.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Dlink DAP-1320 A2 Firmware | =1.21 | |
Dlink DAP-1320 A2 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-17505 is considered a high-severity vulnerability due to the risk of unauthorized Wi-Fi access.
To mitigate CVE-2019-17505, update your D-Link DAP-1320 A2 router to the latest firmware version that addresses this vulnerability.
CVE-2019-17505 allows attackers to access sensitive information, such as Wi-Fi SSID and password, potentially leading to unauthorized network access.
CVE-2019-17505 specifically affects the D-Link DAP-1320 A2 router running firmware version 1.21.
Yes, CVE-2019-17505 can be exploited remotely, allowing attackers to obtain Wi-Fi credentials without being physically present on the network.