D-Link DIR-850L REV. B (with firmware through FW208WWb02) devices have a hardcoded password of wrgac25_dlink.2013gui_dir850l for the Alphanetworks account upon device reset, which allows remote attackers to obtain root access via a TELNET session.
References
Link | Resource |
---|---|
https://pierrekim.github.io/blog/2017-09-08-dlink-850l-mydlink-cloud-0days-vulnerabilities.html | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Information
Published : 2017-09-13 10:29
Updated : 2017-09-20 17:51
NVD link : CVE-2017-14421
Mitre link : CVE-2017-14421
JSON object : View
CWE
CWE-798
Use of Hard-coded Credentials
Products Affected
d-link
- dir-850l
- dir-850l_firmware