Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-5cwj-g9vv-pmp6

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

An issue was discovered on D-Link DIR-600M 3.02, 3.03, 3.04, and 3.06 devices. wan.htm can be accessed directly without authentication, which can lead to disclosure of information about the WAN, and can also be leveraged by an attacker to modify the data fields of the page.

An issue was discovered on D-Link DIR-600M 3.02, 3.03, 3.04, and 3.06 devices. wan.htm can be accessed directly without authentication, which can lead to disclosure of information about the WAN, and can also be leveraged by an attacker to modify the data fields of the page.

EPSS

Процентиль: 99%
0.84956
Высокий

Дефекты

CWE-306

Связанные уязвимости

CVSS3: 9.8
nvd
больше 6 лет назад

An issue was discovered on D-Link DIR-600M 3.02, 3.03, 3.04, and 3.06 devices. wan.htm can be accessed directly without authentication, which can lead to disclosure of information about the WAN, and can also be leveraged by an attacker to modify the data fields of the page.

CVSS3: 9.8
fstec
больше 6 лет назад

Уязвимость компонента wan.htm микропрограммного обеспечения Wi-Fi роутеров D-Link DIR-600M N 150, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации и изменить настройки конфигурации

EPSS

Процентиль: 99%
0.84956
Высокий

Дефекты

CWE-306