The D-Link DIR-615 device before v20.12PTb04 doesn't use SSL for any of the authenticated pages. Also, it doesn't allow the user to generate his own SSL Certificate. An attacker can simply monitor network traffic to steal a user's credentials and/or credentials of users being added while sniffing the traffic.
References
Link | Resource |
---|---|
https://www.qualys.com/2017/03/12/qsa-2017-03-12/qsa-2017-03-12.pdf | Third Party Advisory |
ftp://ftp2.dlink.com/SECURITY_ADVISEMENTS/DIR-615/REVT/DIR-615_REVT_FIRMWARE_PATCH_v20.12PTb04.zip | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Information
Published : 2017-07-07 05:29
Updated : 2021-04-23 07:49
NVD link : CVE-2017-7406
Mitre link : CVE-2017-7406
JSON object : View
Products Affected
dlink
- dir-615