Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-45pg-8qp2-9cmj

Опубликовано: 19 мая 2025
Источник: github
Github: Не прошло ревью
CVSS4: 6.9
CVSS3: 5.3

Описание

A vulnerability, which was classified as critical, was found in D-Link DI-7003GV2 24.04.18D1 R(68125). This affects the function sub_41F4F0 of the file /H5/webgl.asp?tggl_port=0&remote_management=0&http_passwd=game&exec_service=admin-restart. The manipulation leads to unverified password change. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.

A vulnerability, which was classified as critical, was found in D-Link DI-7003GV2 24.04.18D1 R(68125). This affects the function sub_41F4F0 of the file /H5/webgl.asp?tggl_port=0&remote_management=0&http_passwd=game&exec_service=admin-restart. The manipulation leads to unverified password change. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.

EPSS

Процентиль: 63%
0.00439
Низкий

6.9 Medium

CVSS4

5.3 Medium

CVSS3

Дефекты

CWE-620

Связанные уязвимости

CVSS3: 5.3
nvd
9 месяцев назад

A vulnerability, which was classified as critical, was found in D-Link DI-7003GV2 24.04.18D1 R(68125). This affects the function sub_41F4F0 of the file /H5/webgl.asp?tggl_port=0&remote_management=0&http_passwd=game&exec_service=admin-restart. The manipulation leads to unverified password change. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.

CVSS3: 5.3
fstec
9 месяцев назад

Уязвимость функции sub_41F4F0 микропрограммного обеспечения роутеров D-Link DI-7003GV2, позволяющая нарушителю изменить пароль пользователя

EPSS

Процентиль: 63%
0.00439
Низкий

6.9 Medium

CVSS4

5.3 Medium

CVSS3

Дефекты

CWE-620