Логотип exploitDog
bind:CVE-2021-34204
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2021-34204

Количество 3

Количество 3

nvd логотип

CVE-2021-34204

больше 4 лет назад

D-Link DIR-2640-US 1.01B04 is affected by Insufficiently Protected Credentials. D-Link AC2600(DIR-2640) stores the device system account password in plain text. It does not use linux user management. In addition, the passwords of all devices are the same, and they cannot be modified by normal users. An attacker can easily log in to the target router through the serial port and obtain root privileges.

CVSS3: 6.8
EPSS: Низкий
github логотип

GHSA-m45q-r6x2-5q77

больше 3 лет назад

D-Link DIR-2640-US 1.01B04 is affected by Insufficiently Protected Credentials. D-Link AC2600(DIR-2640) stores the device system account password in plain text. It does not use linux user management. In addition, the passwords of all devices are the same, and they cannot be modified by normal users. An attacker can easily log in to the target router through the serial port and obtain root privileges.

EPSS: Низкий
fstec логотип

BDU:2021-06048

около 5 лет назад

Уязвимость микропрограммного обеспечения маршрутизатора D-Link DIR-2640-US, связанная с недостаточной защитой регистрационных данных, позволяющая нарушителю повысить свои привилегии до уровня root

CVSS3: 6.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2021-34204

D-Link DIR-2640-US 1.01B04 is affected by Insufficiently Protected Credentials. D-Link AC2600(DIR-2640) stores the device system account password in plain text. It does not use linux user management. In addition, the passwords of all devices are the same, and they cannot be modified by normal users. An attacker can easily log in to the target router through the serial port and obtain root privileges.

CVSS3: 6.8
0%
Низкий
больше 4 лет назад
github логотип
GHSA-m45q-r6x2-5q77

D-Link DIR-2640-US 1.01B04 is affected by Insufficiently Protected Credentials. D-Link AC2600(DIR-2640) stores the device system account password in plain text. It does not use linux user management. In addition, the passwords of all devices are the same, and they cannot be modified by normal users. An attacker can easily log in to the target router through the serial port and obtain root privileges.

0%
Низкий
больше 3 лет назад
fstec логотип
BDU:2021-06048

Уязвимость микропрограммного обеспечения маршрутизатора D-Link DIR-2640-US, связанная с недостаточной защитой регистрационных данных, позволяющая нарушителю повысить свои привилегии до уровня root

CVSS3: 6.8
0%
Низкий
около 5 лет назад

Уязвимостей на страницу