First published: Fri Mar 04 2022(Updated: )
Local File Inclusion due to path traversal in D-Link DAP-1620 leads to unauthorized internal files reading [/etc/passwd] and [/etc/shadow].
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Dlink DAP-1620 Firmware | ||
Dlink Dap-1620 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-46381 has a high severity rating due to its potential for unauthorized reading of sensitive internal files.
To fix CVE-2021-46381, users should upgrade to the latest firmware version provided by D-Link.
CVE-2021-46381 exploits a local file inclusion vulnerability caused by path traversal in the D-Link DAP-1620.
CVE-2021-46381 allows unauthorized reading of critical internal files, including /etc/passwd and /etc/shadow.
CVE-2021-46381 specifically affects the D-Link DAP-1620 and its firmware.