Vulnerabilites related to dlink - dir-601
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://0x62626262.wordpress.com/2019/12/24/dlink-dir-601-router-authentication-bypass-and-csrf/ | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://0x62626262.wordpress.com/2019/12/24/dlink-dir-601-router-authentication-bypass-and-csrf/ | Exploit, Third Party Advisory |
Vendor | Product | Version | |
---|---|---|---|
dlink | dir-601_firmware | 2.00na | |
dlink | dir-601 | b1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dlink:dir-601_firmware:2.00na:*:*:*:*:*:*:*", "matchCriteriaId": "D36B48D4-CBF5-4D9E-B8BA-DE9E42D853BA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dlink:dir-601:b1:*:*:*:*:*:*:*", "matchCriteriaId": "9236E5C3-AA5A-4F4C-AD79-221F7E640A96", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "D-Link DIR-601 B1 2.00NA devices have CSRF because no anti-CSRF token is implemented. A remote attacker could exploit this in conjunction with CVE-2019-16327 to enable remote router management and device compromise. NOTE: this is an end-of-life product." }, { "lang": "es", "value": "Los dispositivos D-Link DIR-601 B1 versi\u00f3n 2.00NA, presentan una vulnerabilidad de tipo CSRF porque no se implementa ning\u00fan token anti-CSRF. Un atacante remoto podr\u00eda explotar esto en conjunto con CVE-2019-16327 para permitir la administraci\u00f3n remota del enrutador y el compromiso del dispositivo. NOTA: este es un producto al final de su vida \u00fatil." } ], "id": "CVE-2019-16326", "lastModified": "2024-11-21T04:30:31.497", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-12-26T18:15:10.547", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://0x62626262.wordpress.com/2019/12/24/dlink-dir-601-router-authentication-bypass-and-csrf/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://0x62626262.wordpress.com/2019/12/24/dlink-dir-601-router-authentication-bypass-and-csrf/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-352" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
dlink | dir-601_firmware | 1.02na | |
dlink | dir-601 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dlink:dir-601_firmware:1.02na:*:*:*:*:*:*:*", "matchCriteriaId": "BBDBA9AA-F29A-46A8-B33D-A4950D8FB1B0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dlink:dir-601:-:*:*:*:*:*:*:*", "matchCriteriaId": "2143472E-7A2D-494C-9B65-36BB834929AF", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Directory traversal vulnerability in the TFTP server in D-Link DIR-601 Wireless N150 Home Router with firmware 1.02NA allows remote attackers to read arbitrary files via unspecified vectors." }, { "lang": "es", "value": "Vulnerabilidad de salto de directorio en el servidor TFTP en D-Link DIR-601 Wireless N150 Home Router con firmware 1.02NA permite a atacantes remotos leer ficheros arbitrarios a trav\u00e9s de vectores no especificados." } ], "id": "CVE-2011-4821", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-06-20T14:55:04.687", "references": [ { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/47762" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/521369" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/51659" }, { "source": "cve@mitre.org", "url": "http://www.solutionary.com/research/vulnerability-disclosures/2012/01/d-link-dir-601-tftp-directory-traversal-vulnerability" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/47762" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/521369" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/51659" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.solutionary.com/research/vulnerability-disclosures/2012/01/d-link-dir-601-tftp-directory-traversal-vulnerability" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://seclists.org/fulldisclosure/2018/Aug/45 | Mailing List, Third Party Advisory | |
cve@mitre.org | https://www.exploit-db.com/exploits/45306/ | Exploit, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2018/Aug/45 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.exploit-db.com/exploits/45306/ | Exploit, Third Party Advisory, VDB Entry |
Vendor | Product | Version | |
---|---|---|---|
dlink | dir-601_firmware | 2.02na | |
dlink | dir-601 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dlink:dir-601_firmware:2.02na:*:*:*:*:*:*:*", "matchCriteriaId": "221A8460-F903-4052-914E-1184D44C62C5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dlink:dir-601:-:*:*:*:*:*:*:*", "matchCriteriaId": "2143472E-7A2D-494C-9B65-36BB834929AF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered on D-Link DIR-601 2.02NA devices. Being local to the network and having only \"User\" account (which is a low privilege account) access, an attacker can intercept the response from a POST request to obtain \"Admin\" rights due to the admin password being displayed in XML." }, { "lang": "es", "value": "Se ha descubierto un problema en dispositivos D-Link DIR-601 2.02NA. Si est\u00e1 en la red local y tiene solo acceso de cuenta \"User\" (que tiene bajos privilegios), un atacante puede interceptar la respuesta de una petici\u00f3n POST para obtener derechos de \"Admin\" debido a que la contrase\u00f1a de administrador se muestra en XML." } ], "id": "CVE-2018-12710", "lastModified": "2024-11-21T03:45:42.933", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 2.7, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:A/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 5.1, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.1, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-08-29T19:29:00.267", "references": [ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2018/Aug/45" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/45306/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2018/Aug/45" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/45306/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-319" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://0x62626262.wordpress.com/2019/12/24/dlink-dir-601-router-authentication-bypass-and-csrf/ | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://0x62626262.wordpress.com/2019/12/24/dlink-dir-601-router-authentication-bypass-and-csrf/ | Exploit, Third Party Advisory |
Vendor | Product | Version | |
---|---|---|---|
dlink | dir-601_firmware | 2.00na | |
dlink | dir-601 | b1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dlink:dir-601_firmware:2.00na:*:*:*:*:*:*:*", "matchCriteriaId": "D36B48D4-CBF5-4D9E-B8BA-DE9E42D853BA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dlink:dir-601:b1:*:*:*:*:*:*:*", "matchCriteriaId": "9236E5C3-AA5A-4F4C-AD79-221F7E640A96", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "D-Link DIR-601 B1 2.00NA devices are vulnerable to authentication bypass. They do not check for authentication at the server side and rely on client-side validation, which is bypassable. NOTE: this is an end-of-life product." }, { "lang": "es", "value": "Los dispositivos D-Link DIR-601 B1 versi\u00f3n 2.00NA, son vulnerables a una omisi\u00f3n de autenticaci\u00f3n. No comprueban la autenticaci\u00f3n en el lado del servidor y conf\u00edan en la comprobaci\u00f3n del lado del cliente, que es omitible. NOTA: este es un producto al final de su vida \u00fatil." } ], "id": "CVE-2019-16327", "lastModified": "2024-11-21T04:30:31.640", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-12-26T18:15:10.627", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://0x62626262.wordpress.com/2019/12/24/dlink-dir-601-router-authentication-bypass-and-csrf/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://0x62626262.wordpress.com/2019/12/24/dlink-dir-601-router-authentication-bypass-and-csrf/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-287" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://seclists.org/fulldisclosure/2018/Mar/66 | Mailing List, Third Party Advisory | |
cve@mitre.org | https://securityadvisories.dlink.com/announcement/publication.aspx?name=SAP10111 | ||
cve@mitre.org | https://www.exploit-db.com/exploits/44388/ | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2018/Mar/66 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://securityadvisories.dlink.com/announcement/publication.aspx?name=SAP10111 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://www.exploit-db.com/exploits/44388/ | Third Party Advisory, VDB Entry |
Vendor | Product | Version | |
---|---|---|---|
dlink | dir-601_firmware | 2.02na | |
dlink | dir-601 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dlink:dir-601_firmware:2.02na:*:*:*:*:*:*:*", "matchCriteriaId": "221A8460-F903-4052-914E-1184D44C62C5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dlink:dir-601:-:*:*:*:*:*:*:*", "matchCriteriaId": "2143472E-7A2D-494C-9B65-36BB834929AF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered on D-Link DIR-601 B1 2.02NA devices. Being on the same local network as, but being unauthenticated to, the administrator\u0027s panel, a user can obtain the admin username and cleartext password in the response (specifically, the configuration file restore_default), which is displayed in XML." }, { "lang": "es", "value": "Se ha descubierto un problema en dispositivos D-Link DIR-601 B1 2.02NA. Estando en la misma red local, pero estando autenticado, que el panel del administrador, un usuario puede obtener el nombre de usuario del administrador y la contrase\u00f1a en texto claro en la respuesta (concretamente, el archivo de configuraci\u00f3n restore_default), mostrada en XML." } ], "id": "CVE-2018-5708", "lastModified": "2024-11-21T04:09:12.890", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 6.1, "confidentialityImpact": "COMPLETE", "integrityImpact": "NONE", "vectorString": "AV:A/AC:L/Au:N/C:C/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 6.5, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.1, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-03-30T21:29:01.870", "references": [ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2018/Mar/66" }, { "source": "cve@mitre.org", "url": "https://securityadvisories.dlink.com/announcement/publication.aspx?name=SAP10111" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/44388/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2018/Mar/66" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://securityadvisories.dlink.com/announcement/publication.aspx?name=SAP10111" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/44388/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-522" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
CVE-2019-16326 (GCVE-0-2019-16326)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
https://0x62626262.wordpress.com/2019/12/24/dlink-dir-601-router-authentication-bypass-and-csrf/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T01:10:41.666Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://0x62626262.wordpress.com/2019/12/24/dlink-dir-601-router-authentication-bypass-and-csrf/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2019-12-24T00:00:00", "descriptions": [ { "lang": "en", "value": "D-Link DIR-601 B1 2.00NA devices have CSRF because no anti-CSRF token is implemented. A remote attacker could exploit this in conjunction with CVE-2019-16327 to enable remote router management and device compromise. NOTE: this is an end-of-life product." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-12-26T17:27:42", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://0x62626262.wordpress.com/2019/12/24/dlink-dir-601-router-authentication-bypass-and-csrf/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-16326", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "D-Link DIR-601 B1 2.00NA devices have CSRF because no anti-CSRF token is implemented. A remote attacker could exploit this in conjunction with CVE-2019-16327 to enable remote router management and device compromise. NOTE: this is an end-of-life product." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://0x62626262.wordpress.com/2019/12/24/dlink-dir-601-router-authentication-bypass-and-csrf/", "refsource": "MISC", "url": "https://0x62626262.wordpress.com/2019/12/24/dlink-dir-601-router-authentication-bypass-and-csrf/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-16326", "datePublished": "2019-12-26T17:27:42", "dateReserved": "2019-09-15T00:00:00", "dateUpdated": "2024-08-05T01:10:41.666Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-16327 (GCVE-0-2019-16327)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
https://0x62626262.wordpress.com/2019/12/24/dlink-dir-601-router-authentication-bypass-and-csrf/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T01:10:41.670Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://0x62626262.wordpress.com/2019/12/24/dlink-dir-601-router-authentication-bypass-and-csrf/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2019-12-24T00:00:00", "descriptions": [ { "lang": "en", "value": "D-Link DIR-601 B1 2.00NA devices are vulnerable to authentication bypass. They do not check for authentication at the server side and rely on client-side validation, which is bypassable. NOTE: this is an end-of-life product." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-12-26T17:28:35", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://0x62626262.wordpress.com/2019/12/24/dlink-dir-601-router-authentication-bypass-and-csrf/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-16327", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "D-Link DIR-601 B1 2.00NA devices are vulnerable to authentication bypass. They do not check for authentication at the server side and rely on client-side validation, which is bypassable. NOTE: this is an end-of-life product." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://0x62626262.wordpress.com/2019/12/24/dlink-dir-601-router-authentication-bypass-and-csrf/", "refsource": "MISC", "url": "https://0x62626262.wordpress.com/2019/12/24/dlink-dir-601-router-authentication-bypass-and-csrf/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-16327", "datePublished": "2019-12-26T17:28:35", "dateReserved": "2019-09-15T00:00:00", "dateUpdated": "2024-08-05T01:10:41.670Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-12710 (GCVE-0-2018-12710)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
http://seclists.org/fulldisclosure/2018/Aug/45 | mailing-list, x_refsource_FULLDISC | |
https://www.exploit-db.com/exploits/45306/ | exploit, x_refsource_EXPLOIT-DB |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T08:45:02.120Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20180827 CVE-2018-12710", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2018/Aug/45" }, { "name": "45306", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/45306/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2018-08-27T00:00:00", "descriptions": [ { "lang": "en", "value": "An issue was discovered on D-Link DIR-601 2.02NA devices. Being local to the network and having only \"User\" account (which is a low privilege account) access, an attacker can intercept the response from a POST request to obtain \"Admin\" rights due to the admin password being displayed in XML." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-09-01T09:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20180827 CVE-2018-12710", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2018/Aug/45" }, { "name": "45306", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/45306/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-12710", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered on D-Link DIR-601 2.02NA devices. Being local to the network and having only \"User\" account (which is a low privilege account) access, an attacker can intercept the response from a POST request to obtain \"Admin\" rights due to the admin password being displayed in XML." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20180827 CVE-2018-12710", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2018/Aug/45" }, { "name": "45306", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/45306/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-12710", "datePublished": "2018-08-29T19:00:00", "dateReserved": "2018-06-24T00:00:00", "dateUpdated": "2024-08-05T08:45:02.120Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-5708 (GCVE-0-2018-5708)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
https://www.exploit-db.com/exploits/44388/ | exploit, x_refsource_EXPLOIT-DB | |
http://seclists.org/fulldisclosure/2018/Mar/66 | mailing-list, x_refsource_FULLDISC | |
https://securityadvisories.dlink.com/announcement/publication.aspx?name=SAP10111 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T05:40:51.189Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "44388", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/44388/" }, { "name": "20180330 CVE-2018-5708", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2018/Mar/66" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://securityadvisories.dlink.com/announcement/publication.aspx?name=SAP10111" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2018-03-30T00:00:00", "descriptions": [ { "lang": "en", "value": "An issue was discovered on D-Link DIR-601 B1 2.02NA devices. Being on the same local network as, but being unauthenticated to, the administrator\u0027s panel, a user can obtain the admin username and cleartext password in the response (specifically, the configuration file restore_default), which is displayed in XML." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-04-11T20:09:07", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "44388", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/44388/" }, { "name": "20180330 CVE-2018-5708", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2018/Mar/66" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://securityadvisories.dlink.com/announcement/publication.aspx?name=SAP10111" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-5708", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered on D-Link DIR-601 B1 2.02NA devices. Being on the same local network as, but being unauthenticated to, the administrator\u0027s panel, a user can obtain the admin username and cleartext password in the response (specifically, the configuration file restore_default), which is displayed in XML." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "44388", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/44388/" }, { "name": "20180330 CVE-2018-5708", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2018/Mar/66" }, { "name": "https://securityadvisories.dlink.com/announcement/publication.aspx?name=SAP10111", "refsource": "CONFIRM", "url": "https://securityadvisories.dlink.com/announcement/publication.aspx?name=SAP10111" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-5708", "datePublished": "2018-03-30T21:00:00", "dateReserved": "2018-01-16T00:00:00", "dateUpdated": "2024-08-05T05:40:51.189Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2011-4821 (GCVE-0-2011-4821)
Vulnerability from cvelistv5
- n/a
▼ | URL | Tags |
---|---|---|
http://www.solutionary.com/research/vulnerability-disclosures/2012/01/d-link-dir-601-tftp-directory-traversal-vulnerability | x_refsource_MISC | |
http://www.securityfocus.com/bid/51659 | vdb-entry, x_refsource_BID | |
http://secunia.com/advisories/47762 | third-party-advisory, x_refsource_SECUNIA | |
http://www.securityfocus.com/archive/1/521369 | mailing-list, x_refsource_BUGTRAQ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T00:16:34.962Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.solutionary.com/research/vulnerability-disclosures/2012/01/d-link-dir-601-tftp-directory-traversal-vulnerability" }, { "name": "51659", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/51659" }, { "name": "47762", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/47762" }, { "name": "20120125 D-Link DIR-601 TFTP Directory Traversal Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/521369" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-01-20T00:00:00", "descriptions": [ { "lang": "en", "value": "Directory traversal vulnerability in the TFTP server in D-Link DIR-601 Wireless N150 Home Router with firmware 1.02NA allows remote attackers to read arbitrary files via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2014-06-20T13:57:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://www.solutionary.com/research/vulnerability-disclosures/2012/01/d-link-dir-601-tftp-directory-traversal-vulnerability" }, { "name": "51659", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/51659" }, { "name": "47762", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/47762" }, { "name": "20120125 D-Link DIR-601 TFTP Directory Traversal Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/521369" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2011-4821", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Directory traversal vulnerability in the TFTP server in D-Link DIR-601 Wireless N150 Home Router with firmware 1.02NA allows remote attackers to read arbitrary files via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.solutionary.com/research/vulnerability-disclosures/2012/01/d-link-dir-601-tftp-directory-traversal-vulnerability", "refsource": "MISC", "url": "http://www.solutionary.com/research/vulnerability-disclosures/2012/01/d-link-dir-601-tftp-directory-traversal-vulnerability" }, { "name": "51659", "refsource": "BID", "url": "http://www.securityfocus.com/bid/51659" }, { "name": "47762", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/47762" }, { "name": "20120125 D-Link DIR-601 TFTP Directory Traversal Vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/521369" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2011-4821", "datePublished": "2014-06-20T14:00:00", "dateReserved": "2011-12-14T00:00:00", "dateUpdated": "2024-08-07T00:16:34.962Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
var-201808-0761
Vulnerability from variot
An issue was discovered on D-Link DIR-601 2.02NA devices. Being local to the network and having only "User" account (which is a low privilege account) access, an attacker can intercept the response from a POST request to obtain "Admin" rights due to the admin password being displayed in XML. D-Link DIR-601 Contains vulnerabilities related to certificate and password management.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. D-LinkDIR-601 is a wireless router product from D-Link. A security vulnerability exists in the D-LinkDIR-6012.02NA release, which stems from the inclusion of an administrator password in the XML. A local attacker could exploit the vulnerability to gain administrative privileges by hijacking the response to a POST request.
[Vulnerability Type] Insecure Permissions
[VulnerabilityType Other] Privilege Escalation
[Vendor of Product] D-Link
[Affected Product Code Base] DIR-601 - 2.02NA
[Attack Type] Local
[Impact Escalation of Privileges] true
[Impact Information Disclosure] true
[Has vendor confirmed or acknowledged the vulnerability?] true
[Discoverer] Kevin Randall
Show details on source website{ "affected_products": { "_id": null, "data": [ { "_id": null, "model": "dir-601", "scope": "eq", "trust": 1.4, "vendor": "d link", "version": "2.02na" }, { "_id": null, "model": "dir-601", "scope": "eq", "trust": 1.0, "vendor": "dlink", "version": "2.02na" }, { "_id": null, "model": "dir-601 2.02na", "scope": null, "trust": 0.6, "vendor": "d link", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-17086" }, { "db": "JVNDB", "id": "JVNDB-2018-010076" }, { "db": "CNNVD", "id": "CNNVD-201808-923" }, { "db": "NVD", "id": "CVE-2018-12710" } ] }, "configurations": { "_id": null, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:d-link:dir-601_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-010076" } ] }, "credits": { "_id": null, "data": "Kevin Randall", "sources": [ { "db": "PACKETSTORM", "id": "149125" } ], "trust": 0.1 }, "cve": "CVE-2018-12710", "cvss": { "_id": null, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "SINGLE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 2.7, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 5.1, "id": "CVE-2018-12710", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 1.9, "vectorString": "AV:A/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "CNVD-2018-17086", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "SINGLE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 2.7, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 5.1, "id": "VHN-122697", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.1, "vectorString": "AV:A/AC:L/AU:S/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "ADJACENT", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 8.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.1, "id": "CVE-2018-12710", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.8, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2018-12710", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2018-12710", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2018-17086", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201808-923", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-122697", "trust": 0.1, "value": "LOW" }, { "author": "VULMON", "id": "CVE-2018-12710", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-17086" }, { "db": "VULHUB", "id": "VHN-122697" }, { "db": "VULMON", "id": "CVE-2018-12710" }, { "db": "JVNDB", "id": "JVNDB-2018-010076" }, { "db": "CNNVD", "id": "CNNVD-201808-923" }, { "db": "NVD", "id": "CVE-2018-12710" } ] }, "description": { "_id": null, "data": "An issue was discovered on D-Link DIR-601 2.02NA devices. Being local to the network and having only \"User\" account (which is a low privilege account) access, an attacker can intercept the response from a POST request to obtain \"Admin\" rights due to the admin password being displayed in XML. D-Link DIR-601 Contains vulnerabilities related to certificate and password management.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. D-LinkDIR-601 is a wireless router product from D-Link. A security vulnerability exists in the D-LinkDIR-6012.02NA release, which stems from the inclusion of an administrator password in the XML. A local attacker could exploit the vulnerability to gain administrative privileges by hijacking the response to a POST request. \n\n------------------------------------------\n\n[Vulnerability Type]\nInsecure Permissions\n\n------------------------------------------\n\n[VulnerabilityType Other]\nPrivilege Escalation\n\n------------------------------------------\n\n[Vendor of Product]\nD-Link\n\n------------------------------------------\n\n[Affected Product Code Base]\nDIR-601 - 2.02NA\n\n------------------------------------------\n\n[Attack Type]\nLocal\n\n------------------------------------------\n\n[Impact Escalation of Privileges]\ntrue\n\n------------------------------------------\n\n[Impact Information Disclosure]\ntrue\n\n------------------------------------------\n\n[Has vendor confirmed or acknowledged the vulnerability?]\ntrue\n\n------------------------------------------\n\n[Discoverer]\nKevin Randall\n", "sources": [ { "db": "NVD", "id": "CVE-2018-12710" }, { "db": "JVNDB", "id": "JVNDB-2018-010076" }, { "db": "CNVD", "id": "CNVD-2018-17086" }, { "db": "VULHUB", "id": "VHN-122697" }, { "db": "VULMON", "id": "CVE-2018-12710" }, { "db": "PACKETSTORM", "id": "149125" } ], "trust": 2.43 }, "exploit_availability": { "_id": null, "data": [ { "reference": "https://www.scap.org.cn/vuln/vhn-122697", "trust": 0.1, "type": "unknown" }, { "reference": "https://vulmon.com/exploitdetails?qidtp=exploitdb\u0026qid=45306", "trust": 0.1, "type": "exploit" } ], "sources": [ { "db": "VULHUB", "id": "VHN-122697" }, { "db": "VULMON", "id": "CVE-2018-12710" } ] }, "external_ids": { "_id": null, "data": [ { "db": "NVD", "id": "CVE-2018-12710", "trust": 3.3 }, { "db": "EXPLOIT-DB", "id": "45306", "trust": 2.6 }, { "db": "JVNDB", "id": "JVNDB-2018-010076", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201808-923", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2018-17086", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "149125", "trust": 0.2 }, { "db": "SEEBUG", "id": "SSVID-97529", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-122697", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2018-12710", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-17086" }, { "db": "VULHUB", "id": "VHN-122697" }, { "db": "VULMON", "id": "CVE-2018-12710" }, { "db": "JVNDB", "id": "JVNDB-2018-010076" }, { "db": "PACKETSTORM", "id": "149125" }, { "db": "CNNVD", "id": "CNNVD-201808-923" }, { "db": "NVD", "id": "CVE-2018-12710" } ] }, "id": "VAR-201808-0761", "iot": { "_id": null, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2018-17086" }, { "db": "VULHUB", "id": "VHN-122697" } ], "trust": 1.2740741 }, "iot_taxonomy": { "_id": null, "data": [ { "category": [ "ICS", "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-17086" } ] }, "last_update_date": "2024-11-23T23:12:04.243000Z", "patch": { "_id": null, "data": [ { "title": "DIR-601", "trust": 0.8, "url": "https://support.dlink.com/ProductInfo.aspx?m=DIR-601" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-010076" } ] }, "problemtype_data": { "_id": null, "data": [ { "problemtype": "CWE-319", "trust": 1.1 }, { "problemtype": "CWE-255", "trust": 0.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-122697" }, { "db": "JVNDB", "id": "JVNDB-2018-010076" }, { "db": "NVD", "id": "CVE-2018-12710" } ] }, "references": { "_id": null, "data": [ { "trust": 1.9, "url": "https://www.exploit-db.com/exploits/45306/" }, { "trust": 1.8, "url": "http://seclists.org/fulldisclosure/2018/aug/45" }, { "trust": 1.5, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-12710" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-12710" }, { "trust": 0.8, "url": "https://www.exploit-db.com/exploits/45306" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/319.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-17086" }, { "db": "VULHUB", "id": "VHN-122697" }, { "db": "VULMON", "id": "CVE-2018-12710" }, { "db": "JVNDB", "id": "JVNDB-2018-010076" }, { "db": "PACKETSTORM", "id": "149125" }, { "db": "CNNVD", "id": "CNNVD-201808-923" }, { "db": "NVD", "id": "CVE-2018-12710" } ] }, "sources": { "_id": null, "data": [ { "db": "CNVD", "id": "CNVD-2018-17086", "ident": null }, { "db": "VULHUB", "id": "VHN-122697", "ident": null }, { "db": "VULMON", "id": "CVE-2018-12710", "ident": null }, { "db": "JVNDB", "id": "JVNDB-2018-010076", "ident": null }, { "db": "PACKETSTORM", "id": "149125", "ident": null }, { "db": "CNNVD", "id": "CNNVD-201808-923", "ident": null }, { "db": "NVD", "id": "CVE-2018-12710", "ident": null } ] }, "sources_release_date": { "_id": null, "data": [ { "date": "2018-08-31T00:00:00", "db": "CNVD", "id": "CNVD-2018-17086", "ident": null }, { "date": "2018-08-29T00:00:00", "db": "VULHUB", "id": "VHN-122697", "ident": null }, { "date": "2018-08-29T00:00:00", "db": "VULMON", "id": "CVE-2018-12710", "ident": null }, { "date": "2018-12-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-010076", "ident": null }, { "date": "2018-08-28T10:11:11", "db": "PACKETSTORM", "id": "149125", "ident": null }, { "date": "2018-08-30T00:00:00", "db": "CNNVD", "id": "CNNVD-201808-923", "ident": null }, { "date": "2018-08-29T19:29:00.267000", "db": "NVD", "id": "CVE-2018-12710", "ident": null } ] }, "sources_update_date": { "_id": null, "data": [ { "date": "2018-08-31T00:00:00", "db": "CNVD", "id": "CNVD-2018-17086", "ident": null }, { "date": "2019-10-03T00:00:00", "db": "VULHUB", "id": "VHN-122697", "ident": null }, { "date": "2023-04-26T00:00:00", "db": "VULMON", "id": "CVE-2018-12710", "ident": null }, { "date": "2018-12-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-010076", "ident": null }, { "date": "2019-10-23T00:00:00", "db": "CNNVD", "id": "CNNVD-201808-923", "ident": null }, { "date": "2024-11-21T03:45:42.933000", "db": "NVD", "id": "CVE-2018-12710", "ident": null } ] }, "threat_type": { "_id": null, "data": "remote or local", "sources": [ { "db": "CNNVD", "id": "CNNVD-201808-923" } ], "trust": 0.6 }, "title": { "_id": null, "data": "D-Link DIR-601 Vulnerabilities related to certificate and password management", "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-010076" } ], "trust": 0.8 }, "type": { "_id": null, "data": "trust management problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-201808-923" } ], "trust": 0.6 } }
var-201912-0975
Vulnerability from variot
D-Link DIR-601 B1 2.00NA devices are vulnerable to authentication bypass. They do not check for authentication at the server side and rely on client-side validation, which is bypassable. NOTE: this is an end-of-life product. D-Link DIR-601 The device contains an authentication vulnerability.Information is acquired, information is falsified, and denial of service (DoS) May be in a state. D-Link DIR-601 B1 is a wireless router from Taiwan D-Link.
The D-Link DIR-601 B1 2.00NA version has an authentication bypass vulnerability, which originates from the fact that the program is only on the client and fails to authenticate on the server. An attacker could use this vulnerability to bypass authentication and perform arbitrary actions
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201912-0975", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "dir-601", "scope": "eq", "trust": 1.6, "vendor": "dlink", "version": "2.00na" }, { "model": "dir-601", "scope": "eq", "trust": 0.8, "vendor": "d link", "version": "b1 2.00na" }, { "model": "technology dir-601 b1 2.00na", "scope": null, "trust": 0.6, "vendor": "youxun", "version": null }, { "model": "dir-601", "scope": "eq", "trust": 0.6, "vendor": "dlink", "version": "b1" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-02551" }, { "db": "JVNDB", "id": "JVNDB-2019-013962" }, { "db": "CNNVD", "id": "CNNVD-201912-1137" }, { "db": "NVD", "id": "CVE-2019-16327" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:d-link:dir-601_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-013962" } ] }, "cve": "CVE-2019-16327", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2019-16327", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CNVD-2020-02551", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2019-16327", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2019-16327", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2019-16327", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2019-16327", "trust": 0.8, "value": "Critical" }, { "author": "CNVD", "id": "CNVD-2020-02551", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201912-1137", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-02551" }, { "db": "JVNDB", "id": "JVNDB-2019-013962" }, { "db": "CNNVD", "id": "CNNVD-201912-1137" }, { "db": "NVD", "id": "CVE-2019-16327" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "D-Link DIR-601 B1 2.00NA devices are vulnerable to authentication bypass. They do not check for authentication at the server side and rely on client-side validation, which is bypassable. NOTE: this is an end-of-life product. D-Link DIR-601 The device contains an authentication vulnerability.Information is acquired, information is falsified, and denial of service (DoS) May be in a state. D-Link DIR-601 B1 is a wireless router from Taiwan D-Link. \n\r\n\r\nThe D-Link DIR-601 B1 2.00NA version has an authentication bypass vulnerability, which originates from the fact that the program is only on the client and fails to authenticate on the server. An attacker could use this vulnerability to bypass authentication and perform arbitrary actions", "sources": [ { "db": "NVD", "id": "CVE-2019-16327" }, { "db": "JVNDB", "id": "JVNDB-2019-013962" }, { "db": "CNVD", "id": "CNVD-2020-02551" } ], "trust": 2.16 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-16327", "trust": 3.0 }, { "db": "JVNDB", "id": "JVNDB-2019-013962", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2020-02551", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-201912-1137", "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-02551" }, { "db": "JVNDB", "id": "JVNDB-2019-013962" }, { "db": "CNNVD", "id": "CNNVD-201912-1137" }, { "db": "NVD", "id": "CVE-2019-16327" } ] }, "id": "VAR-201912-0975", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2020-02551" } ], "trust": 1.38703705 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-02551" } ] }, "last_update_date": "2024-11-23T21:36:22.455000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "DIR-601", "trust": 0.8, "url": "https://support.dlink.com/ProductInfo.aspx?m=DIR-601" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-013962" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-287", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-013962" }, { "db": "NVD", "id": "CVE-2019-16327" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.4, "url": "https://0x62626262.wordpress.com/2019/12/24/dlink-dir-601-router-authentication-bypass-and-csrf/" }, { "trust": 2.0, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-16327" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-16327" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-02551" }, { "db": "JVNDB", "id": "JVNDB-2019-013962" }, { "db": "CNNVD", "id": "CNNVD-201912-1137" }, { "db": "NVD", "id": "CVE-2019-16327" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2020-02551" }, { "db": "JVNDB", "id": "JVNDB-2019-013962" }, { "db": "CNNVD", "id": "CNNVD-201912-1137" }, { "db": "NVD", "id": "CVE-2019-16327" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-01-27T00:00:00", "db": "CNVD", "id": "CNVD-2020-02551" }, { "date": "2020-01-22T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-013962" }, { "date": "2019-12-26T00:00:00", "db": "CNNVD", "id": "CNNVD-201912-1137" }, { "date": "2019-12-26T18:15:10.627000", "db": "NVD", "id": "CVE-2019-16327" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-01-17T00:00:00", "db": "CNVD", "id": "CNVD-2020-02551" }, { "date": "2020-01-22T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-013962" }, { "date": "2020-01-17T00:00:00", "db": "CNNVD", "id": "CNNVD-201912-1137" }, { "date": "2024-11-21T04:30:31.640000", "db": "NVD", "id": "CVE-2019-16327" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201912-1137" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "D-Link DIR-601 Authentication vulnerabilities in devices", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-013962" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "authorization issue", "sources": [ { "db": "CNNVD", "id": "CNNVD-201912-1137" } ], "trust": 0.6 } }
var-201406-0031
Vulnerability from variot
Directory traversal vulnerability in the TFTP server in D-Link DIR-601 Wireless N150 Home Router with firmware 1.02NA allows remote attackers to read arbitrary files via unspecified vectors. The D-Link DIR-601 is a wireless router device. The attacker performs the WAN interface monitored by the TFTP server without authentication. D-Link DIR-601 is prone to a directory-traversal vulnerability because it fails to sufficiently sanitize user-supplied input. Exploiting this issue can allow an attacker to gain access to system and other configuration files. D-Link DIR-601 1.02NA is vulnerable; other versions may be affected. ----------------------------------------------------------------------
SC Magazine awards the Secunia CSI a 5-Star rating Top-level rating for ease of use, performance, documentation, support, and value for money. Read more and get a free trial here: http://secunia.com/blog/296
TITLE: 2X ApplicationServer TuxSystem ActiveX Control "ExportSettings()" Insecure Method
SECUNIA ADVISORY ID: SA47657
VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/47657/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=47657
RELEASE DATE: 2012-02-03
DISCUSS ADVISORY: http://secunia.com/advisories/47657/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s)
http://secunia.com/advisories/47657/
ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=47657
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION: Andrea Micalizzi has discovered a vulnerability in 2X ApplicationServer TuxSystem ActiveX Control, which can be exploited by malicious people to manipulate certain data.
The vulnerability is caused due to the TuxSystem ActiveX control (TuxScripting.dll) providing an insecure "ExportSettings()" method, which can be exploited to create or overwrite arbitrary files in the context of the currently logged-on user.
The vulnerability is confirmed in version 10.1 Build 1224.
SOLUTION: Set the kill-bit for the affected ActiveX control.
PROVIDED AND/OR DISCOVERED BY: Andrea Micalizzi (rgod) via Secunia.
OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
.
SOLUTION: Disable the TFTP service
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201406-0031", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "dir-601", "scope": "eq", "trust": 1.4, "vendor": "d link", "version": "1.02na" }, { "model": "dir-601", "scope": "eq", "trust": 1.0, "vendor": "dlink", "version": "1.02na" }, { "model": "dir-601", "scope": "eq", "trust": 1.0, "vendor": "dlink", "version": null }, { "model": "dir-601 1.02na", "scope": null, "trust": 0.9, "vendor": "d link", "version": null }, { "model": "dir-601", "scope": null, "trust": 0.8, "vendor": "d link", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2012-0378" }, { "db": "BID", "id": "51659" }, { "db": "JVNDB", "id": "JVNDB-2011-005336" }, { "db": "CNNVD", "id": "CNNVD-201202-012" }, { "db": "NVD", "id": "CVE-2011-4821" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/h:d-link:dir-601", "vulnerable": true }, { "cpe22Uri": "cpe:/o:d-link:dir-601_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2011-005336" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Rob Kraus and Solutionary Engineering Research Team", "sources": [ { "db": "BID", "id": "51659" }, { "db": "CNNVD", "id": "CNNVD-201202-012" } ], "trust": 0.9 }, "cve": "CVE-2011-4821", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2011-4821", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-52766", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2011-4821", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2011-4821", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-201202-012", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-52766", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-52766" }, { "db": "JVNDB", "id": "JVNDB-2011-005336" }, { "db": "CNNVD", "id": "CNNVD-201202-012" }, { "db": "NVD", "id": "CVE-2011-4821" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Directory traversal vulnerability in the TFTP server in D-Link DIR-601 Wireless N150 Home Router with firmware 1.02NA allows remote attackers to read arbitrary files via unspecified vectors. The D-Link DIR-601 is a wireless router device. The attacker performs the WAN interface monitored by the TFTP server without authentication. D-Link DIR-601 is prone to a directory-traversal vulnerability because it fails to sufficiently sanitize user-supplied input. \nExploiting this issue can allow an attacker to gain access to system and other configuration files. \nD-Link DIR-601 1.02NA is vulnerable; other versions may be affected. ----------------------------------------------------------------------\n\nSC Magazine awards the Secunia CSI a 5-Star rating\nTop-level rating for ease of use, performance, documentation, support, and value for money. Read more and get a free trial here: http://secunia.com/blog/296 \n\n----------------------------------------------------------------------\n\nTITLE:\n2X ApplicationServer TuxSystem ActiveX Control \"ExportSettings()\"\nInsecure Method\n\nSECUNIA ADVISORY ID:\nSA47657\n\nVERIFY ADVISORY:\nSecunia.com\nhttp://secunia.com/advisories/47657/\nCustomer Area (Credentials Required)\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=47657\n\nRELEASE DATE:\n2012-02-03\n\nDISCUSS ADVISORY:\nhttp://secunia.com/advisories/47657/#comments\n\nAVAILABLE ON SITE AND IN CUSTOMER AREA:\n * Last Update\n * Popularity\n * Comments\n * Criticality Level\n * Impact\n * Where\n * Solution Status\n * Operating System / Software\n * CVE Reference(s)\n\nhttp://secunia.com/advisories/47657/\n\nONLY AVAILABLE IN CUSTOMER AREA:\n * Authentication Level\n * Report Reliability\n * Secunia PoC\n * Secunia Analysis\n * Systems Affected\n * Approve Distribution\n * Remediation Status\n * Secunia CVSS Score\n * CVSS\n\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=47657\n\nONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:\n * AUTOMATED SCANNING\n\nhttp://secunia.com/vulnerability_scanning/personal/\nhttp://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/\n\nDESCRIPTION:\nAndrea Micalizzi has discovered a vulnerability in 2X\nApplicationServer TuxSystem ActiveX Control, which can be exploited\nby malicious people to manipulate certain data. \n\nThe vulnerability is caused due to the TuxSystem ActiveX control\n(TuxScripting.dll) providing an insecure \"ExportSettings()\" method,\nwhich can be exploited to create or overwrite arbitrary files in the\ncontext of the currently logged-on user. \n\nThe vulnerability is confirmed in version 10.1 Build 1224. \n\nSOLUTION:\nSet the kill-bit for the affected ActiveX control. \n\nPROVIDED AND/OR DISCOVERED BY:\nAndrea Micalizzi (rgod) via Secunia. \n\nOTHER REFERENCES:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nDEEP LINKS:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXTENDED DESCRIPTION:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXTENDED SOLUTION:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXPLOIT:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\nprivate users keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n. \n\nSOLUTION:\nDisable the TFTP service", "sources": [ { "db": "NVD", "id": "CVE-2011-4821" }, { "db": "JVNDB", "id": "JVNDB-2011-005336" }, { "db": "CNVD", "id": "CNVD-2012-0378" }, { "db": "BID", "id": "51659" }, { "db": "VULHUB", "id": "VHN-52766" }, { "db": "PACKETSTORM", "id": "109399" }, { "db": "PACKETSTORM", "id": "109461" } ], "trust": 2.7 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2011-4821", "trust": 3.4 }, { "db": "BID", "id": "51659", "trust": 2.0 }, { "db": "SECUNIA", "id": "47762", "trust": 1.8 }, { "db": "JVNDB", "id": "JVNDB-2011-005336", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201202-012", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2012-0378", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-52766", "trust": 0.1 }, { "db": "SECUNIA", "id": "47657", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "109399", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "109461", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2012-0378" }, { "db": "VULHUB", "id": "VHN-52766" }, { "db": "BID", "id": "51659" }, { "db": "JVNDB", "id": "JVNDB-2011-005336" }, { "db": "PACKETSTORM", "id": "109399" }, { "db": "PACKETSTORM", "id": "109461" }, { "db": "CNNVD", "id": "CNNVD-201202-012" }, { "db": "NVD", "id": "CVE-2011-4821" } ] }, "id": "VAR-201406-0031", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2012-0378" }, { "db": "VULHUB", "id": "VHN-52766" } ], "trust": 1.2740741 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "IoT", "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2012-0378" } ] }, "last_update_date": "2024-08-14T12:45:51.019000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "\u30c8\u30c3\u30d7\u30da\u30fc\u30b8", "trust": 0.8, "url": "http://www.dlink-jp.com/" }, { "title": "DIR-601", "trust": 0.8, "url": "http://www.dlink.com/us/en/home-solutions/connect/routers/dir-601-wireless-n-150-home-router" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2011-005336" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-22", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-52766" }, { "db": "JVNDB", "id": "JVNDB-2011-005336" }, { "db": "NVD", "id": "CVE-2011-4821" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "http://www.solutionary.com/research/vulnerability-disclosures/2012/01/d-link-dir-601-tftp-directory-traversal-vulnerability" }, { "trust": 2.3, "url": "http://www.securityfocus.com/archive/1/521369" }, { "trust": 1.7, "url": "http://www.securityfocus.com/bid/51659" }, { "trust": 1.7, "url": "http://secunia.com/advisories/47762" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-4821" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-4821" }, { "trust": 0.3, "url": "http://www.dlink.com/" }, { "trust": 0.3, "url": "/archive/1/521369" }, { "trust": 0.2, "url": "http://secunia.com/vulnerability_intelligence/" }, { "trust": 0.2, "url": "http://secunia.com/advisories/secunia_security_advisories/" }, { "trust": 0.2, "url": "http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/" }, { "trust": 0.2, "url": "http://secunia.com/vulnerability_scanning/personal/" }, { "trust": 0.2, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.2, "url": "http://secunia.com/blog/296" }, { "trust": 0.2, "url": "http://secunia.com/advisories/about_secunia_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/47657/" }, { "trust": 0.1, "url": "https://ca.secunia.com/?page=viewadvisory\u0026vuln_id=47657" }, { "trust": 0.1, "url": "http://secunia.com/advisories/47657/#comments" }, { "trust": 0.1, "url": "http://secunia.com/advisories/47762/" }, { "trust": 0.1, "url": "https://ca.secunia.com/?page=viewadvisory\u0026vuln_id=47762" }, { "trust": 0.1, "url": "http://www.solutionary.com/index/sert/vuln-disclosures/d-link_dir-601.php" }, { "trust": 0.1, "url": "http://secunia.com/advisories/47762/#comments" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2012-0378" }, { "db": "VULHUB", "id": "VHN-52766" }, { "db": "BID", "id": "51659" }, { "db": "JVNDB", "id": "JVNDB-2011-005336" }, { "db": "PACKETSTORM", "id": "109399" }, { "db": "PACKETSTORM", "id": "109461" }, { "db": "CNNVD", "id": "CNNVD-201202-012" }, { "db": "NVD", "id": "CVE-2011-4821" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2012-0378" }, { "db": "VULHUB", "id": "VHN-52766" }, { "db": "BID", "id": "51659" }, { "db": "JVNDB", "id": "JVNDB-2011-005336" }, { "db": "PACKETSTORM", "id": "109399" }, { "db": "PACKETSTORM", "id": "109461" }, { "db": "CNNVD", "id": "CNNVD-201202-012" }, { "db": "NVD", "id": "CVE-2011-4821" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2012-02-03T00:00:00", "db": "CNVD", "id": "CNVD-2012-0378" }, { "date": "2014-06-20T00:00:00", "db": "VULHUB", "id": "VHN-52766" }, { "date": "2012-01-25T00:00:00", "db": "BID", "id": "51659" }, { "date": "2014-06-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2011-005336" }, { "date": "2012-02-03T12:32:59", "db": "PACKETSTORM", "id": "109399" }, { "date": "2012-02-06T04:01:44", "db": "PACKETSTORM", "id": "109461" }, { "date": "1900-01-01T00:00:00", "db": "CNNVD", "id": "CNNVD-201202-012" }, { "date": "2014-06-20T14:55:04.687000", "db": "NVD", "id": "CVE-2011-4821" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2012-02-03T00:00:00", "db": "CNVD", "id": "CNVD-2012-0378" }, { "date": "2014-06-23T00:00:00", "db": "VULHUB", "id": "VHN-52766" }, { "date": "2012-01-25T00:00:00", "db": "BID", "id": "51659" }, { "date": "2014-06-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2011-005336" }, { "date": "2023-04-27T00:00:00", "db": "CNNVD", "id": "CNNVD-201202-012" }, { "date": "2023-04-26T19:27:52.350000", "db": "NVD", "id": "CVE-2011-4821" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201202-012" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "D-Link DIR-601 TFTP Server Directory Traversal Vulnerability", "sources": [ { "db": "CNVD", "id": "CNVD-2012-0378" }, { "db": "BID", "id": "51659" } ], "trust": 0.9 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "path traversal", "sources": [ { "db": "CNNVD", "id": "CNNVD-201202-012" } ], "trust": 0.6 } }
var-201803-2161
Vulnerability from variot
An issue was discovered on D-Link DIR-601 B1 2.02NA devices. Being on the same local network as, but being unauthenticated to, the administrator's panel, a user can obtain the admin username and cleartext password in the response (specifically, the configuration file restore_default), which is displayed in XML. D-Link DIR-601 Contains vulnerabilities related to certificate and password management.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. D-LinkDIR-601 is a wireless router product of D-Link\Company. The D-LinkDIR-601 information disclosure vulnerability allows an attacker to exploit the vulnerability to obtain an administrator username/password to access the administrator panel. A trust management vulnerability exists in D-Link DIR-601 B1 version 2.02NA
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201803-2161", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "dir-601", "scope": "eq", "trust": 1.6, "vendor": "dlink", "version": "2.02na" }, { "model": "dir-601", "scope": null, "trust": 0.8, "vendor": "d link", "version": null }, { "model": "dir-601 2.02na b1", "scope": null, "trust": 0.6, "vendor": "d link", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-07034" }, { "db": "JVNDB", "id": "JVNDB-2018-003551" }, { "db": "CNNVD", "id": "CNNVD-201804-022" }, { "db": "NVD", "id": "CVE-2018-5708" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:d-link:dir-601_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-003551" } ] }, "cve": "CVE-2018-5708", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 6.1, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 6.5, "id": "CVE-2018-5708", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:A/AC:L/Au:N/C:C/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2018-07034", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 6.1, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 6.5, "id": "VHN-135740", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:A/AC:L/AU:N/C:C/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "ADJACENT", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 8.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.1, "id": "CVE-2018-5708", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.8, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2018-5708", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2018-5708", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2018-07034", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201804-022", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-135740", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-07034" }, { "db": "VULHUB", "id": "VHN-135740" }, { "db": "JVNDB", "id": "JVNDB-2018-003551" }, { "db": "CNNVD", "id": "CNNVD-201804-022" }, { "db": "NVD", "id": "CVE-2018-5708" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "An issue was discovered on D-Link DIR-601 B1 2.02NA devices. Being on the same local network as, but being unauthenticated to, the administrator\u0027s panel, a user can obtain the admin username and cleartext password in the response (specifically, the configuration file restore_default), which is displayed in XML. D-Link DIR-601 Contains vulnerabilities related to certificate and password management.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. D-LinkDIR-601 is a wireless router product of D-Link\\\\Company. The D-LinkDIR-601 information disclosure vulnerability allows an attacker to exploit the vulnerability to obtain an administrator username/password to access the administrator panel. A trust management vulnerability exists in D-Link DIR-601 B1 version 2.02NA", "sources": [ { "db": "NVD", "id": "CVE-2018-5708" }, { "db": "JVNDB", "id": "JVNDB-2018-003551" }, { "db": "CNVD", "id": "CNVD-2018-07034" }, { "db": "VULHUB", "id": "VHN-135740" } ], "trust": 2.25 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.scap.org.cn/vuln/vhn-135740", "trust": 0.1, "type": "unknown" } ], "sources": [ { "db": "VULHUB", "id": "VHN-135740" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2018-5708", "trust": 3.1 }, { "db": "EXPLOIT-DB", "id": "44388", "trust": 1.7 }, { "db": "DLINK", "id": "SAP10111", "trust": 1.7 }, { "db": "JVNDB", "id": "JVNDB-2018-003551", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201804-022", "trust": 0.7 }, { "db": "EXPLOITALERT", "id": "29337", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2018-07034", "trust": 0.6 }, { "db": "SEEBUG", "id": "SSVID-97209", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "146983", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-135740", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-07034" }, { "db": "VULHUB", "id": "VHN-135740" }, { "db": "JVNDB", "id": "JVNDB-2018-003551" }, { "db": "CNNVD", "id": "CNNVD-201804-022" }, { "db": "NVD", "id": "CVE-2018-5708" } ] }, "id": "VAR-201803-2161", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2018-07034" }, { "db": "VULHUB", "id": "VHN-135740" } ], "trust": 1.48703705 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-07034" } ] }, "last_update_date": "2024-11-23T22:52:10.543000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "DIR-601", "trust": 0.8, "url": "http://support.dlink.com/ProductInfo.aspx?m=DIR-601" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-003551" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-522", "trust": 1.1 }, { "problemtype": "CWE-255", "trust": 0.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-135740" }, { "db": "JVNDB", "id": "JVNDB-2018-003551" }, { "db": "NVD", "id": "CVE-2018-5708" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.1, "url": "http://seclists.org/fulldisclosure/2018/mar/66" }, { "trust": 1.7, "url": "https://securityadvisories.dlink.com/announcement/publication.aspx?name=sap10111" }, { "trust": 1.7, "url": "https://www.exploit-db.com/exploits/44388/" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-5708" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-5708" }, { "trust": 0.6, "url": "https://www.exploitalert.com/view-details.html?id=29337" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-07034" }, { "db": "VULHUB", "id": "VHN-135740" }, { "db": "JVNDB", "id": "JVNDB-2018-003551" }, { "db": "CNNVD", "id": "CNNVD-201804-022" }, { "db": "NVD", "id": "CVE-2018-5708" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2018-07034" }, { "db": "VULHUB", "id": "VHN-135740" }, { "db": "JVNDB", "id": "JVNDB-2018-003551" }, { "db": "CNNVD", "id": "CNNVD-201804-022" }, { "db": "NVD", "id": "CVE-2018-5708" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-04-04T00:00:00", "db": "CNVD", "id": "CNVD-2018-07034" }, { "date": "2018-03-30T00:00:00", "db": "VULHUB", "id": "VHN-135740" }, { "date": "2018-05-28T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-003551" }, { "date": "2018-03-30T00:00:00", "db": "CNNVD", "id": "CNNVD-201804-022" }, { "date": "2018-03-30T21:29:01.870000", "db": "NVD", "id": "CVE-2018-5708" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-04-04T00:00:00", "db": "CNVD", "id": "CNVD-2018-07034" }, { "date": "2019-10-03T00:00:00", "db": "VULHUB", "id": "VHN-135740" }, { "date": "2018-05-28T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-003551" }, { "date": "2019-10-08T00:00:00", "db": "CNNVD", "id": "CNNVD-201804-022" }, { "date": "2024-11-21T04:09:12.890000", "db": "NVD", "id": "CVE-2018-5708" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote or local", "sources": [ { "db": "CNNVD", "id": "CNNVD-201804-022" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "D-Link DIR-601 Vulnerabilities related to certificate and password management", "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-003551" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "trust management problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-201804-022" } ], "trust": 0.6 } }
var-201912-0974
Vulnerability from variot
D-Link DIR-601 B1 2.00NA devices have CSRF because no anti-CSRF token is implemented. A remote attacker could exploit this in conjunction with CVE-2019-16327 to enable remote router management and device compromise. NOTE: this is an end-of-life product. D-Link DIR-601 The device contains a cross-site request forgery vulnerability.Information is acquired, information is falsified, and denial of service (DoS) May be in a state. D-Link DIR-601 B1 is a wireless router from Taiwan D-Link.
A cross-site request forgery vulnerability exists in D-Link DIR-601 B1 2.00NA. The vulnerability stems from a web application's insufficient verification that the request came from a trusted user. An attacker could use this vulnerability to send an unexpected request to the server through an affected client
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201912-0974", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "dir-601", "scope": "eq", "trust": 1.0, "vendor": "dlink", "version": "2.00na" }, { "model": "dir-601", "scope": "eq", "trust": 0.8, "vendor": "d link", "version": "b1 2.00na" }, { "model": "technology dir-601 b1 2.00na", "scope": null, "trust": 0.6, "vendor": "youxun", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-02550" }, { "db": "JVNDB", "id": "JVNDB-2019-013961" }, { "db": "NVD", "id": "CVE-2019-16326" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:d-link:dir-601_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-013961" } ] }, "cve": "CVE-2019-16326", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CVE-2019-16326", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CNVD-2020-02550", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.8, "id": "CVE-2019-16326", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 8.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2019-16326", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2019-16326", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2019-16326", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2020-02550", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201912-1131", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-02550" }, { "db": "JVNDB", "id": "JVNDB-2019-013961" }, { "db": "CNNVD", "id": "CNNVD-201912-1131" }, { "db": "NVD", "id": "CVE-2019-16326" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "D-Link DIR-601 B1 2.00NA devices have CSRF because no anti-CSRF token is implemented. A remote attacker could exploit this in conjunction with CVE-2019-16327 to enable remote router management and device compromise. NOTE: this is an end-of-life product. D-Link DIR-601 The device contains a cross-site request forgery vulnerability.Information is acquired, information is falsified, and denial of service (DoS) May be in a state. D-Link DIR-601 B1 is a wireless router from Taiwan D-Link. \n\nA cross-site request forgery vulnerability exists in D-Link DIR-601 B1 2.00NA. The vulnerability stems from a web application\u0027s insufficient verification that the request came from a trusted user. An attacker could use this vulnerability to send an unexpected request to the server through an affected client", "sources": [ { "db": "NVD", "id": "CVE-2019-16326" }, { "db": "JVNDB", "id": "JVNDB-2019-013961" }, { "db": "CNVD", "id": "CNVD-2020-02550" } ], "trust": 2.16 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-16326", "trust": 3.0 }, { "db": "JVNDB", "id": "JVNDB-2019-013961", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2020-02550", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-201912-1131", "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-02550" }, { "db": "JVNDB", "id": "JVNDB-2019-013961" }, { "db": "CNNVD", "id": "CNNVD-201912-1131" }, { "db": "NVD", "id": "CVE-2019-16326" } ] }, "id": "VAR-201912-0974", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2020-02550" } ], "trust": 1.38703705 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-02550" } ] }, "last_update_date": "2024-11-23T22:11:41.431000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "DIR-601", "trust": 0.8, "url": "https://support.dlink.com/ProductInfo.aspx?m=DIR-601" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-013961" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-352", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-013961" }, { "db": "NVD", "id": "CVE-2019-16326" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.4, "url": "https://0x62626262.wordpress.com/2019/12/24/dlink-dir-601-router-authentication-bypass-and-csrf/" }, { "trust": 2.0, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-16326" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-16326" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-02550" }, { "db": "JVNDB", "id": "JVNDB-2019-013961" }, { "db": "CNNVD", "id": "CNNVD-201912-1131" }, { "db": "NVD", "id": "CVE-2019-16326" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2020-02550" }, { "db": "JVNDB", "id": "JVNDB-2019-013961" }, { "db": "CNNVD", "id": "CNNVD-201912-1131" }, { "db": "NVD", "id": "CVE-2019-16326" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-01-17T00:00:00", "db": "CNVD", "id": "CNVD-2020-02550" }, { "date": "2020-01-22T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-013961" }, { "date": "2019-12-26T00:00:00", "db": "CNNVD", "id": "CNNVD-201912-1131" }, { "date": "2019-12-26T18:15:10.547000", "db": "NVD", "id": "CVE-2019-16326" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-01-17T00:00:00", "db": "CNVD", "id": "CNVD-2020-02550" }, { "date": "2020-01-22T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-013961" }, { "date": "2020-06-23T00:00:00", "db": "CNNVD", "id": "CNNVD-201912-1131" }, { "date": "2024-11-21T04:30:31.497000", "db": "NVD", "id": "CVE-2019-16326" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201912-1131" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "D-Link DIR-601 Cross-site request forgery vulnerability in device", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-013961" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "cross-site request forgery", "sources": [ { "db": "CNNVD", "id": "CNNVD-201912-1131" } ], "trust": 0.6 } }
var-201805-0232
Vulnerability from variot
D-Link DIR-601 A1 1.02NA devices do not require the old password for a password change, which occurs in cleartext. D-Link DIR-601 Contains vulnerabilities related to certificate and password management.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. D-LinkDIR-601 is a wireless router product from D-Link. A security vulnerability exists in the D-LinkDIR-601A11.02NA release, which is caused by the fact that the user does not need the current password when changing the password and the program passes the new username and password in clear text. An attacker could exploit the vulnerability to obtain information by intercepting passed parameters. There is a security vulnerability in D-Link DIR-601 A1 version 1.02NA.
[Additional Information] Insecure Authentication Practices in D-LINK DIR-601 Router, Hardware version A1, Firmware Version 1.02NA
When logging into the router, the authentication module passes the username and password BASE64 encoded vice encrypted. There is also no support for HTTPS connections to the router.
Due to no schedule viability D-Link asks that two items are mentioned in disclosure:
a) For this out of service router, users are encouraged too used DD-WRT firmware here http://www.dd-wrt.com/site/support/router-database b) They can contact support@dlink.com for the latest information on updates.
[VulnerabilityType Other] Weak Authentication and No HTTPS support
[Vendor of Product] D-Link
[Affected Product Code Base] DIR 601 - Hardware A1, Firmware 1.02NA
[Affected Component] Login, Password Changing
[Attack Type] Context-dependent
[Impact Information Disclosure] true
[Attack Vectors] To exploit this, an attacker must have a proxy or man-in-the-middle attack completed and be able to discern the URLs to intercept passed parameters.
[Has vendor confirmed or acknowledged the vulnerability?] true
[Remediation] Due to no schedule viability D-Link asks that two items are mentioned in disclosure:
a) For this out of service router, users are encouraged too used DD-WRT firmware here b) They can contact support@dlink.com for the latest information on updates.
[References] http://us.dlink.com/security-advisories/ http://us.dlink.com/security-advisories/ https://advancedpersistentsecurity.net/cve-2018-10641/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10641
Joe Gray
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201805-0232", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "dir-601", "scope": "eq", "trust": 1.0, "vendor": "dlink", "version": "1.02na" }, { "model": "dir-601", "scope": "eq", "trust": 0.8, "vendor": "d link", "version": "a1 1.02na" }, { "model": "dir-601 a1 1.02na", "scope": null, "trust": 0.6, "vendor": "d link", "version": null }, { "model": "dir-601", "scope": "eq", "trust": 0.6, "vendor": "d link", "version": "1.02na" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-09185" }, { "db": "JVNDB", "id": "JVNDB-2018-004887" }, { "db": "CNNVD", "id": "CNNVD-201805-187" }, { "db": "NVD", "id": "CVE-2018-10641" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:d-link:dir-601_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-004887" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Joe Gray", "sources": [ { "db": "PACKETSTORM", "id": "147499" } ], "trust": 0.1 }, "cve": "CVE-2018-10641", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CVE-2018-10641", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.9, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2018-09185", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "VHN-120421", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "HIGH", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.2, "id": "CVE-2018-10641", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.8, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2018-10641", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2018-10641", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2018-09185", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201805-187", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-120421", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2018-10641", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-09185" }, { "db": "VULHUB", "id": "VHN-120421" }, { "db": "VULMON", "id": "CVE-2018-10641" }, { "db": "JVNDB", "id": "JVNDB-2018-004887" }, { "db": "CNNVD", "id": "CNNVD-201805-187" }, { "db": "NVD", "id": "CVE-2018-10641" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "D-Link DIR-601 A1 1.02NA devices do not require the old password for a password change, which occurs in cleartext. D-Link DIR-601 Contains vulnerabilities related to certificate and password management.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. D-LinkDIR-601 is a wireless router product from D-Link. A security vulnerability exists in the D-LinkDIR-601A11.02NA release, which is caused by the fact that the user does not need the current password when changing the password and the program passes the new username and password in clear text. An attacker could exploit the vulnerability to obtain information by intercepting passed parameters. There is a security vulnerability in D-Link DIR-601 A1 version 1.02NA. \n\n ------------------------------------------\n\n [Additional Information]\n Insecure Authentication Practices in D-LINK DIR-601 Router, Hardware\nversion A1, Firmware Version 1.02NA\n\n When logging into the router, the authentication module passes the\n username and password BASE64 encoded vice encrypted. There is also no support for\n HTTPS connections to the router. \n\n Due to no schedule viability D-Link asks that two items are mentioned in\ndisclosure:\n\n a) For this out of service router, users are encouraged too used DD-WRT\nfirmware here \u003chttp://www.dd-wrt.com/site/support/router-database\u003e\n b) They can contact support@dlink.com for the latest information on\nupdates. \n\n ------------------------------------------\n\n [VulnerabilityType Other]\n Weak Authentication and No HTTPS support\n\n ------------------------------------------\n\n [Vendor of Product]\n D-Link\n\n ------------------------------------------\n\n [Affected Product Code Base]\n DIR 601 - Hardware A1, Firmware 1.02NA\n\n ------------------------------------------\n\n [Affected Component]\n Login, Password Changing\n\n ------------------------------------------\n\n [Attack Type]\n Context-dependent\n\n ------------------------------------------\n\n [Impact Information Disclosure]\n true\n\n ------------------------------------------\n\n [Attack Vectors]\n To exploit this, an attacker must have a proxy or man-in-the-middle attack\ncompleted and be able to discern the URLs to intercept passed parameters. \n\n ------------------------------------------\n\n [Has vendor confirmed or acknowledged the vulnerability?]\n true\n\n ------------------------------------------\n\n [Remediation]\n Due to no schedule viability D-Link asks that two items are mentioned in\ndisclosure:\n\n a) For this out of service router, users are encouraged too used DD-WRT\nfirmware here\n b) They can contact support@dlink.com for the latest information on\nupdates. \n\n ------------------------------------------\n [References]\n http://us.dlink.com/security-advisories/\n\u003chttp://us.dlink.com/security-advisories/\u003e\n https://advancedpersistentsecurity.net/cve-2018-10641/\n https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10641\n\n\n\nJoe Gray\n\n\n", "sources": [ { "db": "NVD", "id": "CVE-2018-10641" }, { "db": "JVNDB", "id": "JVNDB-2018-004887" }, { "db": "CNVD", "id": "CNVD-2018-09185" }, { "db": "VULHUB", "id": "VHN-120421" }, { "db": "VULMON", "id": "CVE-2018-10641" }, { "db": "PACKETSTORM", "id": "147499" } ], "trust": 2.43 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.scap.org.cn/vuln/vhn-120421", "trust": 0.1, "type": "unknown" } ], "sources": [ { "db": "VULHUB", "id": "VHN-120421" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2018-10641", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2018-004887", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201805-187", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2018-09185", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "147499", "trust": 0.2 }, { "db": "VULHUB", "id": "VHN-120421", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2018-10641", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-09185" }, { "db": "VULHUB", "id": "VHN-120421" }, { "db": "VULMON", "id": "CVE-2018-10641" }, { "db": "JVNDB", "id": "JVNDB-2018-004887" }, { "db": "PACKETSTORM", "id": "147499" }, { "db": "CNNVD", "id": "CNNVD-201805-187" }, { "db": "NVD", "id": "CVE-2018-10641" } ] }, "id": "VAR-201805-0232", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2018-09185" }, { "db": "VULHUB", "id": "VHN-120421" } ], "trust": 1.48703705 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "IoT", "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-09185" } ] }, "last_update_date": "2024-11-23T22:30:27.093000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "DIR-601", "trust": 0.8, "url": "http://support.dlink.com/ProductInfo.aspx?m=DIR-601" }, { "title": "Awesome CVE PoC", "trust": 0.1, "url": "https://github.com/lnick2023/nicenice " }, { "title": "Awesome CVE PoC", "trust": 0.1, "url": "https://github.com/xbl3/awesome-cve-poc_qazbnm456 " }, { "title": "Awesome CVE PoC", "trust": 0.1, "url": "https://github.com/qazbnm456/awesome-cve-poc " } ], "sources": [ { "db": "VULMON", "id": "CVE-2018-10641" }, { "db": "JVNDB", "id": "JVNDB-2018-004887" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-287", "trust": 1.1 }, { "problemtype": "CWE-255", "trust": 0.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-120421" }, { "db": "JVNDB", "id": "JVNDB-2018-004887" }, { "db": "NVD", "id": "CVE-2018-10641" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.3, "url": "https://advancedpersistentsecurity.net/cve-2018-10641/" }, { "trust": 1.8, "url": "https://gist.github.com/jocephus/806ff4679cf54af130d69777a551f819" }, { "trust": 1.8, "url": "https://www.peerlyst.com/posts/vulnerability-disclosure-insecure-authentication-practices-in-d-link-router-cve-2018-10641-joe-gray" }, { "trust": 0.9, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-10641" }, { "trust": 0.9, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-10641" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/287.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://github.com/lnick2023/nicenice" }, { "trust": 0.1, "url": "https://github.com/qazbnm456/awesome-cve-poc" }, { "trust": 0.1, "url": "http://www.dd-wrt.com/site/support/router-database\u003e" }, { "trust": 0.1, "url": "http://us.dlink.com/security-advisories/\u003e" }, { "trust": 0.1, "url": "http://us.dlink.com/security-advisories/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-09185" }, { "db": "VULHUB", "id": "VHN-120421" }, { "db": "VULMON", "id": "CVE-2018-10641" }, { "db": "JVNDB", "id": "JVNDB-2018-004887" }, { "db": "PACKETSTORM", "id": "147499" }, { "db": "CNNVD", "id": "CNNVD-201805-187" }, { "db": "NVD", "id": "CVE-2018-10641" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2018-09185" }, { "db": "VULHUB", "id": "VHN-120421" }, { "db": "VULMON", "id": "CVE-2018-10641" }, { "db": "JVNDB", "id": "JVNDB-2018-004887" }, { "db": "PACKETSTORM", "id": "147499" }, { "db": "CNNVD", "id": "CNNVD-201805-187" }, { "db": "NVD", "id": "CVE-2018-10641" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-05-09T00:00:00", "db": "CNVD", "id": "CNVD-2018-09185" }, { "date": "2018-05-04T00:00:00", "db": "VULHUB", "id": "VHN-120421" }, { "date": "2018-05-04T00:00:00", "db": "VULMON", "id": "CVE-2018-10641" }, { "date": "2018-06-29T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-004887" }, { "date": "2018-05-04T17:39:19", "db": "PACKETSTORM", "id": "147499" }, { "date": "2018-05-07T00:00:00", "db": "CNNVD", "id": "CNNVD-201805-187" }, { "date": "2018-05-04T03:29:00.350000", "db": "NVD", "id": "CVE-2018-10641" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-05-09T00:00:00", "db": "CNVD", "id": "CNVD-2018-09185" }, { "date": "2019-10-03T00:00:00", "db": "VULHUB", "id": "VHN-120421" }, { "date": "2023-04-26T00:00:00", "db": "VULMON", "id": "CVE-2018-10641" }, { "date": "2018-06-29T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-004887" }, { "date": "2019-10-23T00:00:00", "db": "CNNVD", "id": "CNNVD-201805-187" }, { "date": "2024-11-21T03:41:42.870000", "db": "NVD", "id": "CVE-2018-10641" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201805-187" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "D-Link DIR-601 Vulnerabilities related to certificate and password management", "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-004887" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "authorization issue", "sources": [ { "db": "CNNVD", "id": "CNNVD-201805-187" } ], "trust": 0.6 } }