Directory Traversal vulnerability in D-Link DAP-1650 Firmware v.1.03 allows a local attacker to escalate privileges via the hedwig.cgi component.
References
Link | Resource |
---|---|
https://coldwx.github.io/CVE-2024-40505.html | Third Party Advisory |
https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10266 | Vendor Advisory |
https://coldwx.github.io/CVE-2024-40505.html | Third Party Advisory |
https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10266 | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
29 May 2025, 20:11
Type | Values Removed | Values Added |
---|---|---|
References | () https://coldwx.github.io/CVE-2024-40505.html - Third Party Advisory | |
References | () https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10266 - Vendor Advisory | |
CPE | cpe:2.3:o:dlink:dap-1650_firmware:1.03:*:*:*:*:*:*:* cpe:2.3:h:dlink:dap-1650:-:*:*:*:*:*:*:* |
|
First Time |
Dlink
Dlink dap-1650 Firmware Dlink dap-1650 |
Information
Published : 2024-07-16 20:15
Updated : 2025-05-29 20:11
NVD link : CVE-2024-40505
Mitre link : CVE-2024-40505
CVE.ORG link : CVE-2024-40505
JSON object : View
Products Affected
dlink
- dap-1650
- dap-1650_firmware
CWE
CWE-35
Path Traversal: '.../...//'