Lucene search

K

Dir-615 Security Vulnerabilities - November

cve
cve

CVE-2009-4821

The D-Link DIR-615 with firmware 3.10NA does not require administrative authentication for apply.cgi, which allows remote attackers to (1) change the admin password via the admin_password parameter, (2) disable the security requirement for the Wi-Fi network via unspecified vectors, or (3) modify DN...

7.5AI Score

0.004EPSS

2010-04-27 03:30 PM
21
cve
cve

CVE-2017-11436

D-Link DIR-615 before v20.12PTb04 has a second admin account with a 0x1 BACKDOOR value, which might allow remote attackers to obtain access via a TELNET connection.

9.8CVSS

9.2AI Score

0.005EPSS

2017-07-19 07:29 AM
29
cve
cve

CVE-2017-7404

On the D-Link DIR-615 before v20.12PTb04, if a victim logged in to the Router's Web Interface visits a malicious site from another Browser tab, the malicious site then can send requests to the victim's Router without knowing the credentials (CSRF). An attacker can host a page that sends a POST requ...

8.8CVSS

8.5AI Score

0.001EPSS

2017-07-07 12:29 PM
26
4
cve
cve

CVE-2017-7405

On the D-Link DIR-615 before v20.12PTb04, once authenticated, this device identifies the user based on the IP address of his machine. By spoofing the IP address belonging to the victim's host, an attacker might be able to take over the administrative session without being prompted for authenticatio...

9.8CVSS

9.4AI Score

0.002EPSS

2017-07-07 12:29 PM
39
4
cve
cve

CVE-2017-7406

The D-Link DIR-615 device before v20.12PTb04 doesn't use SSL for any of the authenticated pages. Also, it doesn't allow the user to generate his own SSL Certificate. An attacker can simply monitor network traffic to steal a user's credentials and/or credentials of users being added while sniffing t...

9.8CVSS

9.1AI Score

0.002EPSS

2017-07-07 12:29 PM
29
4