D-Link DSL-2875AL devices through 1.00.05 are prone to password disclosure via a simple crafted /romfile.cfg request to the web management server. This request doesn't require any authentication and will lead to saving the configuration file. The password is stored in cleartext.
The product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources.
Link | Tags |
---|---|
https://www.dlink.com/en/security-bulletin | vendor advisory |
https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=26165 | third party advisory exploit |