lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <4D09FD0F.1040203@celin.pl> Date: Thu, 16 Dec 2010 12:50:39 +0100 From: Karol Celiński <karol@...in.pl> To: bugtraq@...urityfocus.com Subject: Re: D-Link DIR-300 authentication bypass -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Hi Dlink confirmed my bug in DIR-320 and DIR-600. Links for relevant patched firmware: ftp://ftp.dlink.pl/dir/dir-320/driver_software/DIR-320_fw_revA_1-21B03_all_en_20101213.zip ftp://ftp.dlink.pl/dir/dir-600/driver_software/DIR-600_fw_revB_2-05B01_all_en_20101213.zip - -- Greetings, Karol Celiński. My GPG public key http://www.celin.pl/pub.asc Pentester/Researcher @ Safe Computing -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.10 (GNU/Linux) iEYEARECAAYFAk0J/Q8ACgkQ4hKaO1FYep3fiwCgkbYKz4+4ovTt2qkeSwzCT6Fm 3NsAn0l5wtNoQZ1bFwza7PDNY4bZiGUQ =te7V -----END PGP SIGNATURE-----