Lucene search

K
DlinkDir-601 Firmware

6 matches found

CVE
CVE
added 2019/12/26 6:15 p.m.66 views

CVE-2019-16326

D-Link DIR-601 B1 2.00NA devices have CSRF because no anti-CSRF token is implemented. A remote attacker could exploit this in conjunction with CVE-2019-16327 to enable remote router management and device compromise. NOTE: this is an end-of-life product.

8.8CVSS9.1AI score0.00816EPSS
CVE
CVE
added 2019/12/26 6:15 p.m.57 views

CVE-2019-16327

D-Link DIR-601 B1 2.00NA devices are vulnerable to authentication bypass. They do not check for authentication at the server side and rely on client-side validation, which is bypassable. NOTE: this is an end-of-life product.

9.8CVSS8.8AI score0.0018EPSS
CVE
CVE
added 2018/03/30 9:29 p.m.53 views

CVE-2018-5708

An issue was discovered on D-Link DIR-601 B1 2.02NA devices. Being on the same local network as, but being unauthenticated to, the administrator's panel, a user can obtain the admin username and cleartext password in the response (specifically, the configuration file restore_default), which is disp...

8CVSS7.7AI score0.04411EPSS
CVE
CVE
added 2018/08/29 7:29 p.m.52 views

CVE-2018-12710

An issue was discovered on D-Link DIR-601 2.02NA devices. Being local to the network and having only "User" account (which is a low privilege account) access, an attacker can intercept the response from a POST request to obtain "Admin" rights due to the admin password being displayed in XML.

8CVSS7.7AI score0.59492EPSS
CVE
CVE
added 2014/06/20 2:55 p.m.45 views

CVE-2011-4821

Directory traversal vulnerability in the TFTP server in D-Link DIR-601 Wireless N150 Home Router with firmware 1.02NA allows remote attackers to read arbitrary files via unspecified vectors.

5CVSS4.5AI score0.00158EPSS
CVE
CVE
added 2018/05/04 3:29 a.m.39 views

CVE-2018-10641

D-Link DIR-601 A1 1.02NA devices do not require the old password for a password change, which occurs in cleartext.

8.1CVSS8.1AI score0.02239EPSS