-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathCVE-2021-42627
48 lines (31 loc) · 1.59 KB
/
CVE-2021-42627
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
Description:
An issue discovered on D-Link DIR-615 devices with firmware version 20.06.
'wan.htm' can be accessed directly without authentication, which can lead to disclosure of information about the WAN, and can also be leveraged
by an attacker to modifythe data fields of the page.
------------------------------------------------------------------------------------
Vulnerability Type:
Improper Access Control
------------------------------------------------------------------------------------
Vendor of Product:
D-Link
------------------------------------------------------------------------------------
Affected Product Code Base:
DIR-615 Firmware - 20.06
------------------------------------------------------------------------------------
Attack Type:
Remote
------------------------------------------------------------------------------------
Impact:
Denial of Service => true
Information Disclosure => true
------------------------------------------------------------------------------------
Attack Vectors:
WAN configuration page "wan.htm" on D-Link DIR-615 devices with firmware 20.06 can be accessed directly
without authentication which can lead to disclose the information about WAN settings and also leverage attacker to modify the data fields of page.
Exploit: "<dlink_615_router_ip>/wan.htm"
------------------------------------------------------------------------------------
CVE Reference:
CVE-2021-42627
------------------------------------------------------------------------------------
Credits:
This security vulnerability was found by Sanjok Karki (https://sanjokkarki.com.np)