Описание
There are some web interfaces without authentication requirements on D-Link DIR-412 A1-1.14WW routers. An attacker can clear the router's log file via act=clear&logtype=sysact to log_clear.php, which could be used to erase attack traces.
Ссылки
- Third Party Advisory
- ExploitThird Party Advisory
- Third Party Advisory
- ExploitThird Party Advisory
Уязвимые конфигурации
Конфигурация 1
Одновременно
cpe:2.3:o:dlink:dir-412_firmware:a1-1.14ww:*:*:*:*:*:*:*
cpe:2.3:h:dlink:dir-412:-:*:*:*:*:*:*:*
EPSS
Процентиль: 88%
0.04046
Низкий
9.1 Critical
CVSS3
6.4 Medium
CVSS2
Дефекты
CWE-306
Связанные уязвимости
github
больше 3 лет назад
There are some web interfaces without authentication requirements on D-Link DIR-412 A1-1.14WW routers. An attacker can clear the router's log file via act=clear&logtype=sysact to log_clear.php, which could be used to erase attack traces.
EPSS
Процентиль: 88%
0.04046
Низкий
9.1 Critical
CVSS3
6.4 Medium
CVSS2
Дефекты
CWE-306