D-Link DSL-504T allows remote attackers to bypass...
High severity
Unreviewed
Published
May 1, 2022
to the GitHub Advisory Database
•
Updated Jan 25, 2024
Description
Published by the National Vulnerability Database
May 26, 2005
Published to the GitHub Advisory Database
May 1, 2022
Last updated
Jan 25, 2024
D-Link DSL-504T allows remote attackers to bypass authentication and gain privileges, such as upgrade firmware, restart the router or restore a saved configuration, via a direct request to firmwarecfg.
References