VAR-200610-0308
Vulnerability from variot - Updated: 2025-04-10 23:18Directory traversal vulnerability in cgi-bin/webcm in D-Link DSL-G624T firmware 3.00B01T01.YA-C.20060616 allows remote attackers to read arbitrary files via a .. (dot dot) in the getpage parameter. D-Link DSL-G624T of cgi-bin/webcm Contains a directory traversal vulnerability.By a third party .. A remote attacker can read any file using .. D-Link DSL-G624T devices are prone to a remote information-disclosure vulnerability because the devices fail to properly sanitize user-supplied input. Exploiting this issue allows remote, unauthenticated attackers to gain access to potentially sensitive configuration information from affected devices. This may aid them in further attacks.
Want to work within IT-Security?
Secunia is expanding its team of highly skilled security experts. We will help with relocation and obtaining a work permit.
Currently the following type of positions are available: http://secunia.com/hardcore_disassembler_and_reverse_engineer/
TITLE: D-Link DSL-G624T Directory Traversal and Cross-Site Scripting
SECUNIA ADVISORY ID: SA22524
VERIFY ADVISORY: http://secunia.com/advisories/22524/
CRITICAL: Less critical
IMPACT: Cross Site Scripting, Exposure of sensitive information
WHERE:
From local network
SOFTWARE: D-Link DSL-G624T http://secunia.com/product/12420/
DESCRIPTION: Jose Ramon Palanco has reported some vulnerabilities in D-Link DSL-G624T, which can be exploited by malicious people to conduct cross-site scripting attacks or to disclose certain sensitive information.
1) Input passed to the "upnp%3Asettings%2Fstate" and "upnp%3Asettings%2Fconnection" parameters in cgi-bin/webcm is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.
2) Input passed to the "getpage" parameter in cgi-bin/webcm is not properly verified before being used.
The vulnerabilities are reported in firmware version V3.00B01T01.YA-C.20060616. Other versions may also be affected.
SOLUTION: Do not visit other web sites while accessing the device and use it only in a trusted network.
PROVIDED AND/OR DISCOVERED BY: Jose Ramon Palanco
ORIGINAL ADVISORY: http://www.eazel.es/advisory005-D-Link-DSL-G624T-directoy-transversal-xss-cross-site-scripting-directory-listing-vulnerabilities.html
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website
{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-200610-0308",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "dsl-g624t",
"scope": "eq",
"trust": 1.6,
"vendor": "d link",
"version": "firmware_3.00b01t01.ya_c.2006-06-16"
},
{
"model": "dsl-g624t",
"scope": "eq",
"trust": 0.8,
"vendor": "d link",
"version": "firmware 3.00b01t01.ya-c.20060616"
},
{
"model": "d-link 3.00b01t01.ya c.2006-06-16",
"scope": null,
"trust": 0.6,
"vendor": "dsl g624t",
"version": null
},
{
"model": "dsl-g624t v3.00b01t01.ya-c.200",
"scope": null,
"trust": 0.3,
"vendor": "d link",
"version": null
},
{
"model": "dsl-g624t",
"scope": "eq",
"trust": 0.3,
"vendor": "d link",
"version": "0"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2006-8128"
},
{
"db": "BID",
"id": "20689"
},
{
"db": "JVNDB",
"id": "JVNDB-2006-001445"
},
{
"db": "CNNVD",
"id": "CNNVD-200610-448"
},
{
"db": "NVD",
"id": "CVE-2006-5536"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/h:d-link:dsl-g624t",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2006-001445"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Discovery credited to Jos Ramn Palanco \u003cjose.palanco@eazel.es\u003e.",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200610-448"
}
],
"trust": 0.6
},
"cve": "CVE-2006-5536",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "CVE-2006-5536",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 1.8,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "CNVD-2006-8128",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "VHN-21644",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2006-5536",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "NVD",
"id": "CVE-2006-5536",
"trust": 0.8,
"value": "Medium"
},
{
"author": "CNVD",
"id": "CNVD-2006-8128",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-200610-448",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-21644",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2006-8128"
},
{
"db": "VULHUB",
"id": "VHN-21644"
},
{
"db": "JVNDB",
"id": "JVNDB-2006-001445"
},
{
"db": "CNNVD",
"id": "CNNVD-200610-448"
},
{
"db": "NVD",
"id": "CVE-2006-5536"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Directory traversal vulnerability in cgi-bin/webcm in D-Link DSL-G624T firmware 3.00B01T01.YA-C.20060616 allows remote attackers to read arbitrary files via a .. (dot dot) in the getpage parameter. D-Link DSL-G624T of cgi-bin/webcm Contains a directory traversal vulnerability.By a third party .. A remote attacker can read any file using .. D-Link DSL-G624T devices are prone to a remote information-disclosure vulnerability because the devices fail to properly sanitize user-supplied input. \nExploiting this issue allows remote, unauthenticated attackers to gain access to potentially sensitive configuration information from affected devices. This may aid them in further attacks. \n\n----------------------------------------------------------------------\n\nWant to work within IT-Security?\n\nSecunia is expanding its team of highly skilled security experts. \nWe will help with relocation and obtaining a work permit. \n\nCurrently the following type of positions are available:\nhttp://secunia.com/hardcore_disassembler_and_reverse_engineer/\n\n----------------------------------------------------------------------\n\nTITLE:\nD-Link DSL-G624T Directory Traversal and Cross-Site Scripting\n\nSECUNIA ADVISORY ID:\nSA22524\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/22524/\n\nCRITICAL:\nLess critical\n\nIMPACT:\nCross Site Scripting, Exposure of sensitive information\n\nWHERE:\n\u003eFrom local network\n\nSOFTWARE:\nD-Link DSL-G624T\nhttp://secunia.com/product/12420/\n\nDESCRIPTION:\nJose Ramon Palanco has reported some vulnerabilities in D-Link\nDSL-G624T, which can be exploited by malicious people to conduct\ncross-site scripting attacks or to disclose certain sensitive\ninformation. \n\n1) Input passed to the \"upnp%3Asettings%2Fstate\" and\n\"upnp%3Asettings%2Fconnection\" parameters in cgi-bin/webcm is not\nproperly sanitised before being returned to the user. This can be\nexploited to execute arbitrary HTML and script code in a user\u0027s\nbrowser session in context of an affected site. \n\n2) Input passed to the \"getpage\" parameter in cgi-bin/webcm is not\nproperly verified before being used. \n\nThe vulnerabilities are reported in firmware version\nV3.00B01T01.YA-C.20060616. Other versions may also be affected. \n\nSOLUTION:\nDo not visit other web sites while accessing the device and use it\nonly in a trusted network. \n\nPROVIDED AND/OR DISCOVERED BY:\nJose Ramon Palanco\n\nORIGINAL ADVISORY:\nhttp://www.eazel.es/advisory005-D-Link-DSL-G624T-directoy-transversal-xss-cross-site-scripting-directory-listing-vulnerabilities.html\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
"sources": [
{
"db": "NVD",
"id": "CVE-2006-5536"
},
{
"db": "JVNDB",
"id": "JVNDB-2006-001445"
},
{
"db": "CNVD",
"id": "CNVD-2006-8128"
},
{
"db": "BID",
"id": "20689"
},
{
"db": "VULHUB",
"id": "VHN-21644"
},
{
"db": "PACKETSTORM",
"id": "51318"
}
],
"trust": 2.61
},
"exploit_availability": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"reference": "https://www.scap.org.cn/vuln/vhn-21644",
"trust": 0.1,
"type": "unknown"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-21644"
}
]
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2006-5536",
"trust": 3.4
},
{
"db": "BID",
"id": "20689",
"trust": 2.6
},
{
"db": "SECUNIA",
"id": "22524",
"trust": 1.8
},
{
"db": "SREASON",
"id": "1781",
"trust": 1.7
},
{
"db": "VUPEN",
"id": "ADV-2006-4191",
"trust": 1.7
},
{
"db": "JVNDB",
"id": "JVNDB-2006-001445",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-200610-448",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2006-8128",
"trust": 0.6
},
{
"db": "BUGTRAQ",
"id": "20061023 D-LINK DSL-G624T SEVERAL VULNERABILITIES",
"trust": 0.6
},
{
"db": "SEEBUG",
"id": "SSVID-82392",
"trust": 0.1
},
{
"db": "EXPLOIT-DB",
"id": "28847",
"trust": 0.1
},
{
"db": "VULHUB",
"id": "VHN-21644",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "51318",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2006-8128"
},
{
"db": "VULHUB",
"id": "VHN-21644"
},
{
"db": "BID",
"id": "20689"
},
{
"db": "JVNDB",
"id": "JVNDB-2006-001445"
},
{
"db": "PACKETSTORM",
"id": "51318"
},
{
"db": "CNNVD",
"id": "CNNVD-200610-448"
},
{
"db": "NVD",
"id": "CVE-2006-5536"
}
]
},
"id": "VAR-200610-0308",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2006-8128"
},
{
"db": "VULHUB",
"id": "VHN-21644"
}
],
"trust": 1.7
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"IoT"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2006-8128"
}
]
},
"last_update_date": "2025-04-10T23:18:18.969000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Top Page",
"trust": 0.8,
"url": "http://www.dlink.com/"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2006-001445"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "NVD-CWE-Other",
"trust": 1.0
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2006-5536"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.3,
"url": "http://www.securityfocus.com/bid/20689"
},
{
"trust": 1.8,
"url": "http://www.eazel.es/advisory005-d-link-dsl-g624t-directoy-transversal-xss-cross-site-scripting-directory-listing-vulnerabilities.html"
},
{
"trust": 1.7,
"url": "http://secunia.com/advisories/22524"
},
{
"trust": 1.7,
"url": "http://securityreason.com/securityalert/1781"
},
{
"trust": 1.1,
"url": "http://www.securityfocus.com/archive/1/449486/100/0/threaded"
},
{
"trust": 1.1,
"url": "http://www.vupen.com/english/advisories/2006/4191"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-5536"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2006-5536"
},
{
"trust": 0.6,
"url": "http://www.securityfocus.com/archive/1/archive/1/449486/100/0/threaded"
},
{
"trust": 0.6,
"url": "http://www.frsirt.com/english/advisories/2006/4191"
},
{
"trust": 0.3,
"url": "http://www.dlink.co.uk/?go=gntyp9cgrdfoic4astfcf834mptyko9ztdvhlpg3yv3ovo5+hkltbnlwaafp7dqtfzrqycjg948banfh"
},
{
"trust": 0.3,
"url": "/archive/1/449486"
},
{
"trust": 0.3,
"url": "/archive/1/467484"
},
{
"trust": 0.1,
"url": "http://secunia.com/secunia_security_advisories/"
},
{
"trust": 0.1,
"url": "http://secunia.com/about_secunia_advisories/"
},
{
"trust": 0.1,
"url": "http://secunia.com/product/12420/"
},
{
"trust": 0.1,
"url": "http://secunia.com/hardcore_disassembler_and_reverse_engineer/"
},
{
"trust": 0.1,
"url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/22524/"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2006-8128"
},
{
"db": "VULHUB",
"id": "VHN-21644"
},
{
"db": "BID",
"id": "20689"
},
{
"db": "JVNDB",
"id": "JVNDB-2006-001445"
},
{
"db": "PACKETSTORM",
"id": "51318"
},
{
"db": "CNNVD",
"id": "CNNVD-200610-448"
},
{
"db": "NVD",
"id": "CVE-2006-5536"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2006-8128"
},
{
"db": "VULHUB",
"id": "VHN-21644"
},
{
"db": "BID",
"id": "20689"
},
{
"db": "JVNDB",
"id": "JVNDB-2006-001445"
},
{
"db": "PACKETSTORM",
"id": "51318"
},
{
"db": "CNNVD",
"id": "CNNVD-200610-448"
},
{
"db": "NVD",
"id": "CVE-2006-5536"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2006-10-26T00:00:00",
"db": "CNVD",
"id": "CNVD-2006-8128"
},
{
"date": "2006-10-26T00:00:00",
"db": "VULHUB",
"id": "VHN-21644"
},
{
"date": "2006-10-23T00:00:00",
"db": "BID",
"id": "20689"
},
{
"date": "2012-06-26T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2006-001445"
},
{
"date": "2006-10-25T19:47:27",
"db": "PACKETSTORM",
"id": "51318"
},
{
"date": "2006-10-26T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200610-448"
},
{
"date": "2006-10-26T17:07:00",
"db": "NVD",
"id": "CVE-2006-5536"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2006-10-26T00:00:00",
"db": "CNVD",
"id": "CNVD-2006-8128"
},
{
"date": "2018-10-17T00:00:00",
"db": "VULHUB",
"id": "VHN-21644"
},
{
"date": "2007-05-03T19:19:00",
"db": "BID",
"id": "20689"
},
{
"date": "2012-06-26T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2006-001445"
},
{
"date": "2006-10-30T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200610-448"
},
{
"date": "2025-04-09T00:30:58.490000",
"db": "NVD",
"id": "CVE-2006-5536"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200610-448"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "D-Link DSL-G624T of cgi-bin/webcm Vulnerable to directory traversal",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2006-001445"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "path traversal",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200610-448"
}
],
"trust": 0.6
}
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.