The D-Link DIR-615 with firmware 3.10NA does not require administrative authentication for apply.cgi, which allows remote attackers to (1) change the admin password via the admin_password parameter, (2) disable the security requirement for the Wi-Fi network via unspecified vectors, or (3) modify DNS settings via unspecified vectors.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/37415 | |
http://secunia.com/advisories/37777 | Vendor Advisory |
http://www.hiredhacker.com/2009/12/15/d-link-dir-615-remote-exploit/ | Exploit |
Configurations
Information
Published : 2010-04-27 08:30
Updated : 2010-04-27 21:00
NVD link : CVE-2009-4821
Mitre link : CVE-2009-4821
JSON object : View
CWE
CWE-287
Improper Authentication
Products Affected
dlink
- dir-615