Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-m45q-r6x2-5q77

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

D-Link DIR-2640-US 1.01B04 is affected by Insufficiently Protected Credentials. D-Link AC2600(DIR-2640) stores the device system account password in plain text. It does not use linux user management. In addition, the passwords of all devices are the same, and they cannot be modified by normal users. An attacker can easily log in to the target router through the serial port and obtain root privileges.

D-Link DIR-2640-US 1.01B04 is affected by Insufficiently Protected Credentials. D-Link AC2600(DIR-2640) stores the device system account password in plain text. It does not use linux user management. In addition, the passwords of all devices are the same, and they cannot be modified by normal users. An attacker can easily log in to the target router through the serial port and obtain root privileges.

EPSS

Процентиль: 19%
0.00061
Низкий

Дефекты

CWE-522

Связанные уязвимости

CVSS3: 6.8
nvd
больше 4 лет назад

D-Link DIR-2640-US 1.01B04 is affected by Insufficiently Protected Credentials. D-Link AC2600(DIR-2640) stores the device system account password in plain text. It does not use linux user management. In addition, the passwords of all devices are the same, and they cannot be modified by normal users. An attacker can easily log in to the target router through the serial port and obtain root privileges.

CVSS3: 6.8
fstec
около 5 лет назад

Уязвимость микропрограммного обеспечения маршрутизатора D-Link DIR-2640-US, связанная с недостаточной защитой регистрационных данных, позволяющая нарушителю повысить свои привилегии до уровня root

EPSS

Процентиль: 19%
0.00061
Низкий

Дефекты

CWE-522