ID

VAR-201112-0360


TITLE

D-Link DSL-500T ADSL Router Remote Vulnerability

Trust: 0.6

sources: CNVD: CNVD-2011-5358

DESCRIPTION

The DSL-500T is an ADSL2 terminal with routing function. It is connected to a computer via an Ethernet interface and has powerful routing functions. It is ideal for home, office and SOHO users. D-Link DSL-500T ADSL routers have predictable resource locations, brute force guesses, and cross-site request forgery vulnerabilities that can be exploited by malicious users to change router settings, brute force passwords, perform CSRF attacks, and remote logins.

Trust: 0.6

sources: CNVD: CNVD-2011-5358

IOT TAXONOMY

category:['IoT', 'Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2011-5358

AFFECTED PRODUCTS

vendor:d linkmodel:dsl-500t adsl routerscope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2011-5358

EXTERNAL IDS

db:CNVDid:CNVD-2011-5358

Trust: 0.6

sources: CNVD: CNVD-2011-5358

REFERENCES

url:http://marc.info/?l=full-disclosure

Trust: 0.6

sources: CNVD: CNVD-2011-5358

SOURCES

db:CNVDid:CNVD-2011-5358

LAST UPDATE DATE

2022-05-04T10:09:24.599000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2011-5358date:2011-12-21T00:00:00

SOURCES RELEASE DATE

db:CNVDid:CNVD-2011-5358date:2011-12-21T00:00:00