Certain models of D-Link wireless routers contain an undisclosed factory testing backdoor. Unauthenticated attackers on the local area network can force the device to enable Telnet service by accessing a specific URL and can log in by using the administrator credentials obtained from analyzing the firmware.
References
Configurations
No configuration.
History
21 Nov 2024, 09:48
Type | Values Removed | Values Added |
---|---|---|
References | () https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10398 - | |
References | () https://www.twcert.org.tw/en/cp-139-7880-629f5-2.html - | |
References | () https://www.twcert.org.tw/tw/cp-132-7879-da630-1.html - |
17 Jun 2024, 12:42
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
17 Jun 2024, 04:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-06-17 04:15
Updated : 2024-11-21 09:48
NVD link : CVE-2024-6045
Mitre link : CVE-2024-6045
CVE.ORG link : CVE-2024-6045
JSON object : View
Products Affected
No product.