D-Link DGS-1510-28XMP, DGS-1510-28X, DGS-1510-52X, DGS-1510-52, DGS-1510-28P, DGS-1510-28, and DGS-1510-20 Websmart devices with firmware prior to 1.31.B003 allow malicious users to conduct Unauthenticated Information Disclosure attacks via unspecified vectors.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
dlink websmart_dgs-1510_series_firmware |
Don't wait - update now
D-Link has resolved an authentication bypass flaw in one of its enterprise switches. Flaws in the vendor's DGS-1510 enterprise switch kit, discovered by security researchers Varang Amin and Aditya Sood, were resolved with a firmware update (pdf advisory here). Left unresolved, the security bug can create an unauthenticated command bypass and presents unauthenticated information disclosure risk. "A remote attacker can exploit the authentication bypass vulnerabilities to execute remote and local c...