ID
VAR-201112-0360
TITLE
D-Link DSL-500T ADSL Router Remote Vulnerability
Trust: 0.6
sources:
            
            
            CNVD: CNVD-2011-5358
DESCRIPTION
The DSL-500T is an ADSL2 terminal with routing function. It is connected to a computer via an Ethernet interface and has powerful routing functions. It is ideal for home, office and SOHO users. D-Link DSL-500T ADSL routers have predictable resource locations, brute force guesses, and cross-site request forgery vulnerabilities that can be exploited by malicious users to change router settings, brute force passwords, perform CSRF attacks, and remote logins.
Trust: 0.6
sources:
            
            
            CNVD: CNVD-2011-5358
IOT TAXONOMY
| category: | ['IoT', 'Network device'] | sub_category: | - | Trust: 0.6  | 
sources:
            
            
            CNVD: CNVD-2011-5358
AFFECTED PRODUCTS
| vendor: | d link | model: | dsl-500t adsl router | scope: | - | version: | - | Trust: 0.6  | 
sources:
            
            
            CNVD: CNVD-2011-5358
EXTERNAL IDS
| db: | CNVD | id: | CNVD-2011-5358 | Trust: 0.6  | 
sources:
            
            
            CNVD: CNVD-2011-5358
REFERENCES
| url: | http://marc.info/?l=full-disclosure | Trust: 0.6  | 
sources:
            
            
            CNVD: CNVD-2011-5358
SOURCES
| db: | CNVD | id: | CNVD-2011-5358 | 
LAST UPDATE DATE
2022-05-04T10:09:24.599000+00:00
SOURCES UPDATE DATE
| db: | CNVD | id: | CNVD-2011-5358 | date: | 2011-12-21T00:00:00 | 
SOURCES RELEASE DATE
| db: | CNVD | id: | CNVD-2011-5358 | date: | 2011-12-21T00:00:00 |