Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-rrmc-jw5p-mf7q

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

D-Link DSR-150 with firmware before 1.08B44; DSR-150N with firmware before 1.05B64; DSR-250 and DSR-250N with firmware before 1.08B44; and DSR-500, DSR-500N, DSR-1000, and DSR-1000N with firmware before 1.08B77 have a hardcoded account of username gkJ9232xXyruTRmY, which makes it easier for remote attackers to obtain access by leveraging knowledge of the username.

D-Link DSR-150 with firmware before 1.08B44; DSR-150N with firmware before 1.05B64; DSR-250 and DSR-250N with firmware before 1.08B44; and DSR-500, DSR-500N, DSR-1000, and DSR-1000N with firmware before 1.08B77 have a hardcoded account of username gkJ9232xXyruTRmY, which makes it easier for remote attackers to obtain access by leveraging knowledge of the username.

EPSS

Процентиль: 56%
0.00333
Низкий

Связанные уязвимости

nvd
около 12 лет назад

D-Link DSR-150 with firmware before 1.08B44; DSR-150N with firmware before 1.05B64; DSR-250 and DSR-250N with firmware before 1.08B44; and DSR-500, DSR-500N, DSR-1000, and DSR-1000N with firmware before 1.08B77 have a hardcoded account of username gkJ9232xXyruTRmY, which makes it easier for remote attackers to obtain access by leveraging knowledge of the username.

fstec
больше 12 лет назад

Уязвимость микропрограммного обеспечения маршрутизатора D–Link DSR–500, позволяющая злоумышленнику получить права администратора

EPSS

Процентиль: 56%
0.00333
Низкий