Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
d-link dsl-504t vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2005-1680
D-Link DSL-502T, DSL-504T, DSL-562T, and DSL-G604T, when /cgi-bin/firmwarecfg is executed, allows remote malicious users to bypass authentication (1) if their IP address already exists in /var/tmp/fw_ip or (2) if their request is the first, which causes /var/tmp/fw_ip to be creat...
D-link Dsl-502t
D-link Dsl-g604t
D-link Dsl-504t
D-link Dsl-562t
NA
CVE-2005-1827
D-Link DSL-504T allows remote malicious users to bypass authentication and gain privileges, such as upgrade firmware, restart the router or restore a saved configuration, via a direct request to firmwarecfg.
Dlink Dsl-504t Firmware 1.00b01t16.eu.20040217
1 EDB exploit
7.5
CVSSv3
CVE-2005-1828
D-Link DSL-504T stores usernames and passwords in cleartext in the router configuration file, which allows remote malicious users to obtain sensitive information.
Dlink Dsl-504t Firmware -
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
encryption
CVE-2024-4331
CVE-2024-26925
arbitrary code
CVE-2006-4304
CVE-2024-25458
CVE-2024-27077
reflected XSS
CVE-2024-4059
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started