CVE-2018-10968

On D-Link DIR-550A and DIR-604M devices through v2.10KR, a malicious user can use a default TELNET account to get unauthorized access to vulnerable devices, aka a backdoor access vulnerability.
References
Link Resource
https://fortiguard.com/zeroday/FG-VD-18-061 Third Party Advisory
https://fortiguard.com/zeroday/FG-VD-18-061 Third Party Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:d-link:dir-550a_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:dlink:dir-550a:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:d-link:dir-604m_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:dlink:dir-604m:-:*:*:*:*:*:*:*

History

21 Nov 2024, 03:42

Type Values Removed Values Added
References () https://fortiguard.com/zeroday/FG-VD-18-061 - Third Party Advisory () https://fortiguard.com/zeroday/FG-VD-18-061 - Third Party Advisory

Information

Published : 2018-05-18 14:29

Updated : 2024-11-21 03:42


NVD link : CVE-2018-10968

Mitre link : CVE-2018-10968

CVE.ORG link : CVE-2018-10968


JSON object : View

Products Affected

dlink

  • dir-604m
  • dir-550a

d-link

  • dir-550a_firmware
  • dir-604m_firmware
CWE
CWE-1188

Insecure Default Initialization of Resource