On D-Link DIR-550A and DIR-604M devices through v2.10KR, a malicious user can use a default TELNET account to get unauthorized access to vulnerable devices, aka a backdoor access vulnerability.
References
Link | Resource |
---|---|
https://fortiguard.com/zeroday/FG-VD-18-061 | Third Party Advisory |
https://fortiguard.com/zeroday/FG-VD-18-061 | Third Party Advisory |
Configurations
History
21 Nov 2024, 03:42
Type | Values Removed | Values Added |
---|---|---|
References | () https://fortiguard.com/zeroday/FG-VD-18-061 - Third Party Advisory |
Information
Published : 2018-05-18 14:29
Updated : 2024-11-21 03:42
NVD link : CVE-2018-10968
Mitre link : CVE-2018-10968
CVE.ORG link : CVE-2018-10968
JSON object : View
Products Affected
dlink
- dir-604m
- dir-550a
d-link
- dir-550a_firmware
- dir-604m_firmware
CWE
CWE-1188
Insecure Default Initialization of Resource