cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2005-1828,https://securityvulnerability.io/vulnerability/CVE-2005-1828,,"D-Link DSL-504T stores usernames and passwords in cleartext in the router configuration file, which allows remote attackers to obtain sensitive information.",D-link,Dsl-504t,7.5,HIGH,0.007180000189691782,false,false,false,false,,false,false,2005-05-26T04:00:00.000Z,0 CVE-2005-1827,https://securityvulnerability.io/vulnerability/CVE-2005-1827,,"D-Link DSL-504T allows remote attackers to bypass authentication and gain privileges, such as upgrade firmware, restart the router or restore a saved configuration, via a direct request to firmwarecfg.",D-link,Dsl-504t,,,0.008179999887943268,false,false,false,false,,false,false,2005-05-26T04:00:00.000Z,0 CVE-2005-1680,https://securityvulnerability.io/vulnerability/CVE-2005-1680,,"D-Link DSL-502T, DSL-504T, DSL-562T, and DSL-G604T, when /cgi-bin/firmwarecfg is executed, allows remote attackers to bypass authentication (1) if their IP address already exists in /var/tmp/fw_ip or (2) if their request is the first, which causes /var/tmp/fw_ip to be created and contain their IP address.",D-link,"Dsl-504t,Dsl-562t,Dsl-g604t,Dsl-502t",,,0.005309999920427799,false,false,false,false,,false,false,2005-05-20T04:00:00.000Z,0