D-Link DSL-2875AL devices through 1.00.05 are prone to...
Moderate severity
Unreviewed
Published
May 24, 2022
to the GitHub Advisory Database
•
Updated May 5, 2023
Description
Published by the National Vulnerability Database
Mar 19, 2020
Published to the GitHub Advisory Database
May 24, 2022
Last updated
May 5, 2023
D-Link DSL-2875AL devices through 1.00.05 are prone to password disclosure via a simple crafted /romfile.cfg request to the web management server. This request doesn't require any authentication and will lead to saving the configuration file. The password is stored in cleartext.
References