CVE-2009-4821

The D-Link DIR-615 with firmware 3.10NA does not require administrative authentication for apply.cgi, which allows remote attackers to (1) change the admin password via the admin_password parameter, (2) disable the security requirement for the Wi-Fi network via unspecified vectors, or (3) modify DNS settings via unspecified vectors.
Configurations

Configuration 1 (hide)

cpe:2.3:h:dlink:dir-615:3.10na:*:*:*:*:*:*:*

History

21 Nov 2024, 01:10

Type Values Removed Values Added
References () http://secunia.com/advisories/37777 - Vendor Advisory () http://secunia.com/advisories/37777 - Vendor Advisory
References () http://www.hiredhacker.com/2009/12/15/d-link-dir-615-remote-exploit/ - Exploit () http://www.hiredhacker.com/2009/12/15/d-link-dir-615-remote-exploit/ - Exploit
References () http://www.securityfocus.com/bid/37415 - () http://www.securityfocus.com/bid/37415 -

Information

Published : 2010-04-27 15:30

Updated : 2024-11-21 01:10


NVD link : CVE-2009-4821

Mitre link : CVE-2009-4821

CVE.ORG link : CVE-2009-4821


JSON object : View

Products Affected

dlink

  • dir-615
CWE
CWE-287

Improper Authentication