Description
|
|
Multiple vulnerabilities were identified in D-Link DSL-G624T, which could be exploited by malicious users to gain knowledge of sensitive information, or perform directory traversal and cross site scripting attacks.
The first issue is due to input validation errors in the "cgi-bin/webcm" script when processing the "upnp%3Asettings%2Fstate" and "upnp%3Asettings%2Fconnection" parameters, which could be exploited by attackers to cause arbitrary scripting code to be executed by the user's browser in the security context of an affected Web site.
The second flaw is due to an input validation error in the "cgi-bin/webcm" script that does not validate the "getpage" parameter, which could be exploited by remote attackers to retrieve arbitrary files from a vulnerable system.
|