VulnerAlert



FIRMWARE
16-12-2025 19:33

CVE-2023-53896 Vulnerabilidad documentada

Sin puntuación
Tags
#exploit
#form
#config
#firmware
#vulnerability
#attackers
#authenticated
#configuration
#allow
#attack
#access
Descripción
D-Link DAP-1325 firmware version 1.01 contains a broken access control vulnerability that allows unauthenticated attackers to download device configuration settings without authentication. Attackers can exploit the /cgi-bin/ExportSettings.sh endpoint retrieve sensitive information by directly accessing export script.
https://www.dlink.com/hr/hr/products/dap-1325-n300-wifi-range-extender
https://www.exploit-db.com/exploits/51556
https://www.vulncheck.com/advisories/d-link-dap-hardware-a-unauthenticated-configuration-download
Referencia
Link externo
Ver detalles

Fuente
https://nvd.nist.gov/vuln/detail/CVE-2023-53896
Resultados similares
Coincidentes en almenos en 50% de los tags
16-12-2025 CVE-2025-14553
Exposure of password hashes through an unauthenticated API response in TP-Link Tapo C210 V.1.8 ...
Ver información
16-12-2025 CVE-2025-65427
An issue was discovered in Dbit N300 T1 Pro Easy Setup Wireless Wi-Fi Router on firmware versio...
Ver información
Icons made by Freepik from www.flaticon.com
Este Proyecto fue cofinanciado por el Consejo Nacional de Ciencia y Tecnología (CONACYT) a través del PROINNOVA 2021/2023
Proyecto realizado por