Email address | private |
---|---|
First Active | 2009-09-07 |
Last Active | 2010-07-15 |
A buffer overflow condition can be triggered on the D-Link DAP-1160 by setting URL filtering for an overly long URL, leading to possible arbitrary code execution or denial of service. Successful authentication is required in order to exploit the vulnerability, but attackers can leverage other vulnerabilities for achieving unauthenticated remote exploitation.
bd3ea2fdf1b138ba8150e58e89eabdecdbbee7ee5b621500a372f19db8a7f868
The D-Link DAP-1160 suffers from an authentication bypass vulnerability.
a9f5cea857a1666b127ea7343b56365f2741ec2153b1da2c5d7ff03654988c02
Unauthenticated access and modification of several device parameters, including Wi-Fi SSID, keys and passphrases is possible on the D-Link DAP-1160. Unauthenticated remote reboot of the device can be also performed.
d2a18d8f62f96dd5001bb57152b9b13a661678b95c959b8e0249b7b184879181
The Linksys WAP54Gv3 suffers from a cross site scripting vulnerability in debug.cgi.
294313708cbc83d56122cedaf08f5a02cddf5080987bfeafe6d1d13f7fe35f20
The Linksys WAP54Gv3 has a debug interface allowing for the execution of root privileged shell commands. Hardcoded credentials, that cannot be changed by user, can be used for accessing the debug interface.
fdf38433a8997957918a85f42b989155a632e3f26c1a3e0c4b124196a974e81a
The Netgear WG602v4 suffers from a saved password stack overflow vulnerability.
43880da74509f3b5b9103626adbc669276aacebb54cf3a964bf94e7a2dffa3a0
Pidgin version 2.6.1 suffers from a remote denial of service vulnerability when receiving a malformed IRC TOPIC message from a malicious IRC server.
7ab8b43ac2c2acb3ad6eba05eb13a7a79ce2e4e84598528d24915d411c6ce887