The D-Link DIR-615 device before v20.12PTb04 doesn't use SSL for any of the authenticated pages. Also, it doesn't allow the user to generate his own SSL Certificate. An attacker can simply monitor network traffic to steal a user's credentials and/or credentials of users being added while sniffing the traffic.
References
Link | Resource |
---|---|
ftp://ftp2.dlink.com/SECURITY_ADVISEMENTS/DIR-615/REVT/DIR-615_REVT_FIRMWARE_PATCH_v20.12PTb04.zip | Patch Vendor Advisory |
https://www.qualys.com/2017/03/12/qsa-2017-03-12/qsa-2017-03-12.pdf | Third Party Advisory |
ftp://ftp2.dlink.com/SECURITY_ADVISEMENTS/DIR-615/REVT/DIR-615_REVT_FIRMWARE_PATCH_v20.12PTb04.zip | Patch Vendor Advisory |
https://www.qualys.com/2017/03/12/qsa-2017-03-12/qsa-2017-03-12.pdf | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 03:31
Type | Values Removed | Values Added |
---|---|---|
References | () ftp://ftp2.dlink.com/SECURITY_ADVISEMENTS/DIR-615/REVT/DIR-615_REVT_FIRMWARE_PATCH_v20.12PTb04.zip - Patch, Vendor Advisory | |
References | () https://www.qualys.com/2017/03/12/qsa-2017-03-12/qsa-2017-03-12.pdf - Third Party Advisory |
Information
Published : 2017-07-07 12:29
Updated : 2024-11-21 03:31
NVD link : CVE-2017-7406
Mitre link : CVE-2017-7406
CVE.ORG link : CVE-2017-7406
JSON object : View
Products Affected
dlink
- dir-615