Описание
D-Link COVR-2600R and COVR-3902 Kit before 1.01b05Beta01 use hardcoded credentials for telnet connection, which allows unauthenticated attackers to gain privileged access to the router, and to extract sensitive data or modify the configuration.
Ссылки
- ExploitThird Party AdvisoryVDB Entry
- ExploitThird Party Advisory
- PatchVendor Advisory
- ExploitThird Party AdvisoryVDB Entry
- ExploitThird Party Advisory
- PatchVendor Advisory
Уязвимые конфигурации
Одновременно
Одновременно
EPSS
9.8 Critical
CVSS3
10 Critical
CVSS2
Дефекты
Связанные уязвимости
D-Link COVR-2600R and COVR-3902 Kit before 1.01b05Beta01 use hardcoded credentials for telnet connection, which allows unauthenticated attackers to gain privileged access to the router, and to extract sensitive data or modify the configuration.
Уязвимость микропрограммного обеспечения маршрутизаторов D-Link COVR-2600R и COVR-3902, связанная с использованием предустановленных учетных данных, позволяющая нарушителю повысить свои привилегии
EPSS
9.8 Critical
CVSS3
10 Critical
CVSS2