Bugtraq mailing list archives
Re: D-Link DIR-300 authentication bypass
From: Karol Celiński <karol () celin pl>
Date: Tue, 16 Nov 2010 23:52:32 +0100
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Thanks for your replies ( especially linuxoid.rain at gmail dot com and mfardiles ). Mentioned above users informed me that my vulerability also affect DIR-600 and DIR-320 D-Link router models. I'm going to buy those routers and test all available firmwares. Propably, I will send test results to bugtraq in the next three weeks. If somebody has free time and those routers, help is welcome. Greetings, Karol Celiński. My GPG public key http://www.celin.pl/pub.asc Pentester/Researcher @ Safe Computing -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.10 (GNU/Linux) iEYEARECAAYFAkzjCzAACgkQ4hKaO1FYep1ZwACdH8pgBWzG1Zmt/ZPydaN9JlEs RWkAn1A+0rAJOGRYD66bZxDg5oPDU502 =9/tI -----END PGP SIGNATURE-----
Current thread:
- D-Link DIR-300 authentication bypass Karol Celiński (Nov 09)
- Re: D-Link DIR-300 authentication bypass Karol Celiński (Nov 09)
- Re: D-Link DIR-300 authentication bypass asmo (Nov 15)
- Re: D-Link DIR-300 authentication bypass Karol Celiński (Nov 19)
- <Possible follow-ups>
- Re: D-Link DIR-300 authentication bypass mfardiles (Nov 12)