Local File Inclusion due to path traversal in D-Link DAP-1620 leads to unauthorized internal files reading [/etc/passwd] and [/etc/shadow].
References
Link | Resource |
---|---|
https://www.dlink.com/en/security-bulletin/ | Not Applicable Vendor Advisory |
https://drive.google.com/drive/folders/19OP09msw8l7CJ622nkvnvnt7EKun1eCG?usp=sharing | Exploit Third Party Advisory |
http://packetstormsecurity.com/files/167070/DLINK-DAP-1620-A1-1.01-Directory-Traversal.html | Exploit Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
AND |
|
Information
Published : 2022-03-04 08:15
Updated : 2022-05-12 12:36
NVD link : CVE-2021-46381
Mitre link : CVE-2021-46381
JSON object : View
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Products Affected
dlink
- dap-1620_firmware
- dap-1620