CVE-2024-6045

Certain models of D-Link wireless routers contain an undisclosed factory testing backdoor. Unauthenticated attackers on the local area network can force the device to enable Telnet service by accessing a specific URL and can log in by using the administrator credentials obtained from analyzing the firmware.
Configurations

No configuration.

History

21 Nov 2024, 09:48

Type Values Removed Values Added
References () https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10398 - () https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10398 -
References () https://www.twcert.org.tw/en/cp-139-7880-629f5-2.html - () https://www.twcert.org.tw/en/cp-139-7880-629f5-2.html -
References () https://www.twcert.org.tw/tw/cp-132-7879-da630-1.html - () https://www.twcert.org.tw/tw/cp-132-7879-da630-1.html -

17 Jun 2024, 12:42

Type Values Removed Values Added
Summary
  • (es) Ciertos modelos de enrutadores inalámbricos D-Link contienen una puerta trasera de prueba de fábrica no revelada. Los atacantes no autenticados en la red de área local pueden obligar al dispositivo a habilitar el servicio Telnet accediendo a una URL específica y pueden iniciar sesión utilizando las credenciales de administrador obtenidas al analizar el firmware.

17 Jun 2024, 04:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-06-17 04:15

Updated : 2024-11-21 09:48


NVD link : CVE-2024-6045

Mitre link : CVE-2024-6045

CVE.ORG link : CVE-2024-6045


JSON object : View

Products Affected

No product.

CWE
CWE-798

Use of Hard-coded Credentials

CWE-912

Hidden Functionality