Количество 3
Количество 3
CVE-2020-8862
This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of D-Link DAP-2610 Firmware v2.01RC067 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of passwords. The issue results from the lack of proper password checking. An attacker can leverage this vulnerability to execute arbitrary code in the context of root. Was ZDI-CAN-10082.
GHSA-q3pf-qwv7-gj5j
This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of D-Link DAP-2610 Firmware v2.01RC067 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of passwords. The issue results from the lack of proper password checking. An attacker can leverage this vulnerability to execute arbitrary code in the context of root. Was ZDI-CAN-10082.
BDU:2020-01125
Уязвимость микропрограммного обеспечения беспроводных маршрутизаторов D-Link DAP-2610, позволяющая нарушителю выполнить произвольный код с привилегиями root
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2020-8862 This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of D-Link DAP-2610 Firmware v2.01RC067 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of passwords. The issue results from the lack of proper password checking. An attacker can leverage this vulnerability to execute arbitrary code in the context of root. Was ZDI-CAN-10082. | CVSS3: 8.8 | 5% Низкий | почти 6 лет назад | |
GHSA-q3pf-qwv7-gj5j This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of D-Link DAP-2610 Firmware v2.01RC067 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of passwords. The issue results from the lack of proper password checking. An attacker can leverage this vulnerability to execute arbitrary code in the context of root. Was ZDI-CAN-10082. | 5% Низкий | больше 3 лет назад | ||
BDU:2020-01125 Уязвимость микропрограммного обеспечения беспроводных маршрутизаторов D-Link DAP-2610, позволяющая нарушителю выполнить произвольный код с привилегиями root | CVSS3: 8.8 | 5% Низкий | около 6 лет назад |
Уязвимостей на страницу