Lucene search

K
cve[email protected]CVE-2013-7005
HistoryDec 19, 2013 - 4:24 a.m.

CVE-2013-7005

2013-12-1904:24:57
CWE-200
web.nvd.nist.gov
19
d-link
dsr-150
dsr-150n
dsr-250
dsr-500
dsr-1000
firmware
cleartext password
vulnerability

4.9 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:L/Au:N/C:C/I:N/A:N

8.3 High

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

5.1%

D-Link DSR-150 with firmware before 1.08B44; DSR-150N with firmware before 1.05B64; DSR-250 and DSR-250N with firmware before 1.08B44; and DSR-500, DSR-500N, DSR-1000, and DSR-1000N with firmware before 1.08B77 stores account passwords in cleartext, which allows local users to obtain sensitive information by reading the Users[#][“Password”] fields in /tmp/teamf1.cfg.ascii.

Affected configurations

NVD
Node
dlinkdsr-150_firmwareRange1.08b29
OR
dlinkdsr-150_firmwareMatch1.05b29
OR
dlinkdsr-150_firmwareMatch1.05b35
OR
dlinkdsr-150_firmwareMatch1.05b46
OR
dlinkdsr-150_firmwareMatch1.05b50
AND
dlinkdsr-150Match-
Node
dlinkdsr-250_firmwareRange1.08b39
OR
dlinkdsr-250_firmwareMatch1.01b46
OR
dlinkdsr-250_firmwareMatch1.01b56
OR
dlinkdsr-250_firmwareMatch1.05b20
OR
dlinkdsr-250_firmwareMatch1.05b53
OR
dlinkdsr-250_firmwareMatch1.08b31
AND
dlinkdsr-250Match-
Node
dlinkdsr-1000n_firmwareRange1.08b51
OR
dlinkdsr-1000n_firmwareMatch1.01b50
OR
dlinkdsr-1000n_firmwareMatch1.02b11
OR
dlinkdsr-1000n_firmwareMatch1.02b25
OR
dlinkdsr-1000n_firmwareMatch1.03b12
OR
dlinkdsr-1000n_firmwareMatch1.03b23
OR
dlinkdsr-1000n_firmwareMatch1.03b27
OR
dlinkdsr-1000n_firmwareMatch1.03b36
OR
dlinkdsr-1000n_firmwareMatch1.03b43
OR
dlinkdsr-1000n_firmwareMatch1.04b58
OR
dlinkdsr-1000n_firmwareMatch1.06b43
OR
dlinkdsr-1000n_firmwareMatch1.06b53
AND
dlinkdsr-1000nMatch-
Node
dlinkdsr-150n_firmwareRange1.05b48
AND
dlinkdsr-150nMatch-
Node
dlinkdsr-500_firmwareRange1.08b51
OR
dlinkdsr-500_firmwareMatch1.02b11
OR
dlinkdsr-500_firmwareMatch1.02b25
OR
dlinkdsr-500_firmwareMatch1.03b12
OR
dlinkdsr-500_firmwareMatch1.03b23
OR
dlinkdsr-500_firmwareMatch1.03b27
OR
dlinkdsr-500_firmwareMatch1.03b36
OR
dlinkdsr-500_firmwareMatch1.03b43
OR
dlinkdsr-500_firmwareMatch1.04b58
OR
dlinkdsr-500_firmwareMatch1.06b43
OR
dlinkdsr-500_firmwareMatch1.06b53
AND
dlinkdsr-500Match-
Node
dlinkdsr-1000_firmwareRange1.08b51
OR
dlinkdsr-1000_firmwareMatch1.01b50
OR
dlinkdsr-1000_firmwareMatch1.02b11
OR
dlinkdsr-1000_firmwareMatch1.02b25
OR
dlinkdsr-1000_firmwareMatch1.03b12
OR
dlinkdsr-1000_firmwareMatch1.03b23
OR
dlinkdsr-1000_firmwareMatch1.03b27
OR
dlinkdsr-1000_firmwareMatch1.03b36
OR
dlinkdsr-1000_firmwareMatch1.03b43
OR
dlinkdsr-1000_firmwareMatch1.04b58
OR
dlinkdsr-1000_firmwareMatch1.06b43
OR
dlinkdsr-1000_firmwareMatch1.06b53
AND
dlinkdsr-1000Match-
Node
dlinkdsr-250n_firmwareRange1.08b39
OR
dlinkdsr-250n_firmwareMatch1.01b46
OR
dlinkdsr-250n_firmwareMatch1.01b56
OR
dlinkdsr-250n_firmwareMatch1.05b20
OR
dlinkdsr-250n_firmwareMatch1.05b53
OR
dlinkdsr-250n_firmwareMatch1.08b31
AND
dlinkdsr-250nMatch-
Node
dlinkdsr-500n_firmwareRange1.08b51
OR
dlinkdsr-500n_firmwareMatch1.02b11
OR
dlinkdsr-500n_firmwareMatch1.02b25
OR
dlinkdsr-500n_firmwareMatch1.03b12
OR
dlinkdsr-500n_firmwareMatch1.03b23
OR
dlinkdsr-500n_firmwareMatch1.03b27
OR
dlinkdsr-500n_firmwareMatch1.03b36
OR
dlinkdsr-500n_firmwareMatch1.03b43
OR
dlinkdsr-500n_firmwareMatch1.04b58
OR
dlinkdsr-500n_firmwareMatch1.06b43
OR
dlinkdsr-500n_firmwareMatch1.06b53
AND
dlinkdsr-500nMatch-

4.9 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:L/Au:N/C:C/I:N/A:N

8.3 High

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

5.1%

Related for CVE-2013-7005