High severity8.1NVD Advisory· Published Apr 21, 2017· Updated May 13, 2026
CVE-2016-1559
CVE-2016-1559
Description
D-Link DAP-1353 H/W vers. B1 3.15 and earlier, D-Link DAP-2553 H/W ver. A1 1.31 and earlier, and D-Link DAP-3520 H/W ver. A1 1.16 and earlier reveal wireless passwords and administrative usernames and passwords over SNMP.
Affected products
3- cpe:2.3:o:d-link:dap-1353_h\/w_b1_firmware:3.15:*:*:*:*:*:*:*
- cpe:2.3:o:d-link:dap-2553_h\/w_a1_firmware:1.31:*:*:*:*:*:*:*
- cpe:2.3:o:d-link:dap-3520_h\/w_a1_firmware:1.16:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- www.dlink.com/mk/mk/support/support-news/2016/march/16/firmadyne-cve_2016_1558-cve_2016_1559nvdPatchVendor Advisory
- packetstormsecurity.com/files/135956/D-Link-Netgear-FIRMADYNE-Command-Injection-Buffer-Overflow.htmlnvdBroken LinkThird Party AdvisoryVDB Entry
- seclists.org/fulldisclosure/2016/Feb/112nvdMailing ListThird Party Advisory
News mentions
0No linked articles in our index yet.