CVE-2002-2137
https://notcve.org/view.php?id=CVE-2002-2137
GlobalSunTech Wireless Access Points (1) WISECOM GL2422AP-0T, and possibly OEM products such as (2) D-Link DWL-900AP+ B1 2.1 and 2.2, (3) ALLOY GL-2422AP-S, (4) EUSSO GL2422-AP, and (5) LINKSYS WAP11-V2.2, allow remote attackers to obtain sensitive information like WEP keys, the administrator password, and the MAC filter via a "getsearch" request to UDP port 27155. • http://online.securityfocus.com/archive/1/298432 http://www.iss.net/security_center/static/10536.php http://www.securityfocus.com/bid/6100 •
CVE-2002-1865 – Linksys WAP11 1.3/1.4 / D-Link DI-804 4.68/Dl-704 2.56 b5 - Embedded HTTP Server Denial of Service
https://notcve.org/view.php?id=CVE-2002-1865
Buffer overflow in the Embedded HTTP server, as used in (1) D-Link DI-804 4.68, Dl-704 V2.56b6, and Dl-704 V2.56b5 and (2) Linksys Etherfast BEFW11S4 Wireless AP + Cable/DSL Router 1.37.2 through 1.42.7 and Linksys WAP11 1.3 and 1.4, allows remote attackers to cause a denial of service (crash) via a long header, as demonstrated using the Host header. • https://www.exploit-db.com/exploits/21978 http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0052.html http://www.iss.net/security_center/static/10537.php http://www.securityfocus.com/bid/6090 •
CVE-2002-1068
https://notcve.org/view.php?id=CVE-2002-1068
The web server for D-Link DP-300 print server allows remote attackers to cause a denial of service (hang) via a large HTTP POST request. • http://archives.neohapsis.com/archives/bugtraq/2002-07/0341.html http://marc.info/?l=vuln-dev&m=102779425117680&w=2 http://www.iss.net/security_center/static/9703.php http://www.securityfocus.com/bid/5330 •
CVE-2002-1069
https://notcve.org/view.php?id=CVE-2002-1069
The remote administration capability for the D-Link DI-804 router 4.68 allows remote attackers to bypass authentication and release DHCP addresses or obtain sensitive information via a direct web request to the pages (1) release.htm, (2) Device Status, or (3) Device Information. • http://marc.info/?l=bugtraq&m=103004834131542&w=2 http://online.securityfocus.com/archive/1/288584 http://www.iss.net/security_center/static/9967.php http://www.iss.net/security_center/static/9969.php http://www.securityfocus.com/bid/5544 http://www.securityfocus.com/bid/5553 •
CVE-2001-1221
https://notcve.org/view.php?id=CVE-2001-1221
D-Link DWL-1000AP Firmware 3.2.28 #483 Wireless LAN Access Point uses a default SNMP community string of 'public' which allows remote attackers to gain sensitive information. El punto de acceso a redes LAN sin cables D-Link DWL-1000AP Firmware 3.2.28 #483 usa por defecto la cadena "public" como comunidad SNMP, lo que permite a atacantes remotos obtener acceso a información sensible. • http://www.securityfocus.com/archive/1/246849 http://www.securityfocus.com/bid/3736 •