Total
5 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2019-16326 | 1 Dlink | 2 Dir-601, Dir-601 Firmware | 2024-02-28 | 6.8 MEDIUM | 8.8 HIGH |
D-Link DIR-601 B1 2.00NA devices have CSRF because no anti-CSRF token is implemented. A remote attacker could exploit this in conjunction with CVE-2019-16327 to enable remote router management and device compromise. NOTE: this is an end-of-life product. | |||||
CVE-2019-16327 | 1 Dlink | 2 Dir-601, Dir-601 Firmware | 2024-02-28 | 7.5 HIGH | 9.8 CRITICAL |
D-Link DIR-601 B1 2.00NA devices are vulnerable to authentication bypass. They do not check for authentication at the server side and rely on client-side validation, which is bypassable. NOTE: this is an end-of-life product. | |||||
CVE-2018-12710 | 1 Dlink | 2 Dir-601, Dir-601 Firmware | 2024-02-28 | 2.7 LOW | 8.0 HIGH |
An issue was discovered on D-Link DIR-601 2.02NA devices. Being local to the network and having only "User" account (which is a low privilege account) access, an attacker can intercept the response from a POST request to obtain "Admin" rights due to the admin password being displayed in XML. | |||||
CVE-2018-5708 | 1 Dlink | 2 Dir-601, Dir-601 Firmware | 2024-02-28 | 6.1 MEDIUM | 8.0 HIGH |
An issue was discovered on D-Link DIR-601 B1 2.02NA devices. Being on the same local network as, but being unauthenticated to, the administrator's panel, a user can obtain the admin username and cleartext password in the response (specifically, the configuration file restore_default), which is displayed in XML. | |||||
CVE-2011-4821 | 1 Dlink | 2 Dir-601, Dir-601 Firmware | 2024-02-28 | 5.0 MEDIUM | N/A |
Directory traversal vulnerability in the TFTP server in D-Link DIR-601 Wireless N150 Home Router with firmware 1.02NA allows remote attackers to read arbitrary files via unspecified vectors. |