Longshine Wireless Access Point设备信息泄露漏洞

漏洞信息详情

Longshine Wireless Access Point设备信息泄露漏洞

漏洞简介

Longshine Wireless Access Point (WAP) LCS-883R-AC-B和基于D-Link DI-614+ 2.0的TFTP服务器存在漏洞。远程攻击者通过下载没有认证的配置文件(config.img)和其他文件获得WEP秘密和提升管理员权限。

漏洞公告

Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com .
@securityfocus.com>

参考网址

来源: BID
名称: 6533
链接:http://www.securityfocus.com/bid/6533

来源: BUGTRAQ
名称: 20030106 Re: Longshine WLAN Access-Point LCS-883R VU#310201
链接:http://www.securityfocus.com/archive/1/305391

来源: BUGTRAQ
名称: 20030106 Longshine WLAN Access-Point LCS-883R VU#310201
链接:http://www.securityfocus.com/archive/1/305344

来源: XF
名称: longshine-ap-tftp-access(10997)
链接:http://www.iss.net/security_center/static/10997.php

来源: SECTRACK
名称: 1005897
链接:http://www.securitytracker.com/id?1005897

受影响实体

© 版权声明
THE END
喜欢就支持一下吧
点赞0 分享