CVE-2018-6210

D-Link DIR-620 devices, with a certain Rostelekom variant of firmware 1.0.37, have a hardcoded rostel account, which makes it easier for remote attackers to obtain access via a TELNET session.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:dlink:dir-620_firmware:1.0.37:*:*:*:*:*:*:*
cpe:2.3:h:dlink:dir-620:*:*:*:*:*:*:*:*

History

21 Nov 2024, 04:10

Type Values Removed Values Added
References () https://securelist.com/backdoors-in-d-links-backyard/85530/ - Third Party Advisory () https://securelist.com/backdoors-in-d-links-backyard/85530/ - Third Party Advisory

Information

Published : 2018-06-19 19:29

Updated : 2024-11-21 04:10


NVD link : CVE-2018-6210

Mitre link : CVE-2018-6210

CVE.ORG link : CVE-2018-6210


JSON object : View

Products Affected

dlink

  • dir-620
  • dir-620_firmware
CWE
CWE-798

Use of Hard-coded Credentials