The D-Link DIR-615 with firmware 3.10NA does not require administrative authentication for apply.cgi, which allows remote attackers to (1) change the admin password via the admin_password parameter, (2) disable the security requirement for the Wi-Fi network via unspecified vectors, or (3) modify DNS settings via unspecified vectors.
References
Configurations
History
21 Nov 2024, 01:10
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/37777 - Vendor Advisory | |
References | () http://www.hiredhacker.com/2009/12/15/d-link-dir-615-remote-exploit/ - Exploit | |
References | () http://www.securityfocus.com/bid/37415 - |
Information
Published : 2010-04-27 15:30
Updated : 2024-11-21 01:10
NVD link : CVE-2009-4821
Mitre link : CVE-2009-4821
CVE.ORG link : CVE-2009-4821
JSON object : View
Products Affected
dlink
- dir-615
CWE
CWE-287
Improper Authentication