Certain D-Link devices have a hardcoded Alphanetworks user account with TELNET access because of /etc/config/image_sign or /etc/alpha_config/image_sign. This affects DIR-600 B1 V2.01 for WW, DIR-890L A1 v1.03, DIR-615 J1 v100 (for DCN), DIR-645 A1 v1.03, DIR-815 A1 v1.01, DIR-823 A1 v1.01, and DIR-842 C1 v3.00.
References
Link | Resource |
---|---|
https://github.com/ChandlerChin/Dlink_vuls/blob/master/A%20hard%20coded%20telnet%20user%20was%20discovered%20in%20multiple%20Dlink%20routers.pdf | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
AND |
|
History
No history.
Information
Published : 2019-11-11 14:15
Updated : 2024-02-28 17:28
NVD link : CVE-2019-18852
Mitre link : CVE-2019-18852
CVE.ORG link : CVE-2019-18852
JSON object : View
Products Affected
dlink
- dir-645_a1
- dir-823_a1_firmware
- dir-615_j1_firmware
- dir-842_c1_firmware
- dir-600_b1_firmware
- dir-823_a1
- dir-890l_a1
- dir-815_a1_firmware
- dir-645_a1_firmware
- dir-842_c1
- dir-890l_a1_firmware
- dir-615_j1
- dir-815_a1
- dir-600_b1
CWE
CWE-319
Cleartext Transmission of Sensitive Information