1 results (0.005 seconds)

CVSS: 7.5EPSS: 3%CPEs: 2EXPL: 3

Local File Inclusion due to path traversal in D-Link DAP-1620 leads to unauthorized internal files reading [/etc/passwd] and [/etc/shadow]. Una Inclusión de Archivos Locales debido a un salto de ruta en D-Link DAP-1620 conlleva a una lectura de archivos internos no autorizados [/etc/passwd] y [/etc/shadow] DLINK DAP-1620 A1 version 1.01 suffers from a directory traversal vulnerability. • https://www.exploit-db.com/exploits/50919 http://packetstormsecurity.com/files/167070/DLINK-DAP-1620-A1-1.01-Directory-Traversal.html https://drive.google.com/drive/folders/19OP09msw8l7CJ622nkvnvnt7EKun1eCG?usp=sharing https://www.dlink.com/en/security-bulletin • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •