Vulnerabilites related to dlink - dsl6740c_firmware
CVE-2024-11064 (GCVE-0-2024-11064)
Vulnerability from cvelistv5
Published
2024-11-11 07:35
Modified
2024-11-12 15:41
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Summary
The D-Link DSL6740C modem has an OS Command Injection vulnerability, allowing remote attackers with administrator privileges to inject and execute arbitrary system commands through a specific functionality provided by SSH and Telnet.
References
▼ | URL | Tags |
---|---|---|
https://www.twcert.org.tw/tw/cp-132-8223-f6da0-1.html | vendor-advisory | |
https://www.twcert.org.tw/en/cp-139-8230-11430-2.html | vendor-advisory |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:dlink:dsl6740c_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "dsl6740c_firmware", "vendor": "dlink", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-11064", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-12T15:36:58.531044Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-12T15:41:56.183Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "DSL6740C", "vendor": "D-Link", "versions": [ { "status": "affected", "version": "0" } ] } ], "datePublic": "2024-11-11T07:32:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eThe D-Link DSL6740C modem has an OS Command Injection vulnerability, allowing remote attackers with administrator privileges to inject and execute arbitrary system commands through a specific functionality provided by SSH and Telnet.\u003c/span\u003e" } ], "value": "The D-Link DSL6740C modem has an OS Command Injection vulnerability, allowing remote attackers with administrator privileges to inject and execute arbitrary system commands through a specific functionality provided by SSH and Telnet." } ], "impacts": [ { "capecId": "CAPEC-88", "descriptions": [ { "lang": "en", "value": "CAPEC-88 OS Command Injection" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-78", "description": "CWE-78 Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-11T07:35:00.344Z", "orgId": "cded6c7f-6ce5-4948-8f87-aa7a3bbb6b0e", "shortName": "twcert" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.twcert.org.tw/tw/cp-132-8223-f6da0-1.html" }, { "tags": [ "vendor-advisory" ], "url": "https://www.twcert.org.tw/en/cp-139-8230-11430-2.html" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eThe affected devices are no longer supported for updates. It is recommended to replace the devices.\u003c/span\u003e\n\n\u003cbr\u003e" } ], "value": "The affected devices are no longer supported for updates. It is recommended to replace the devices." } ], "source": { "advisory": "TVN-202411009", "discovery": "EXTERNAL" }, "tags": [ "unsupported-when-assigned" ], "title": "D-Link DSL6740C - OS Command Injection", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "cded6c7f-6ce5-4948-8f87-aa7a3bbb6b0e", "assignerShortName": "twcert", "cveId": "CVE-2024-11064", "datePublished": "2024-11-11T07:35:00.344Z", "dateReserved": "2024-11-11T02:23:33.343Z", "dateUpdated": "2024-11-12T15:41:56.183Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-11065 (GCVE-0-2024-11065)
Vulnerability from cvelistv5
Published
2024-11-11 07:45
Modified
2024-11-12 15:41
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Summary
The D-Link DSL6740C modem has an OS Command Injection vulnerability, allowing remote attackers with administrator privileges to inject and execute arbitrary system commands through a specific functionality provided by SSH and Telnet.
References
▼ | URL | Tags |
---|---|---|
https://www.twcert.org.tw/tw/cp-132-8224-d939e-1.html | third-party-advisory | |
https://www.twcert.org.tw/en/cp-139-8231-2432e-2.html | third-party-advisory |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:dlink:dsl6740c_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "dsl6740c_firmware", "vendor": "dlink", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-11065", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-12T15:36:51.216969Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-12T15:41:39.433Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "DSL6740C", "vendor": "D-Link", "versions": [ { "status": "affected", "version": "0", "versionType": "custom" } ] } ], "datePublic": "2024-11-11T07:36:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "The D-Link DSL6740C modem has an OS Command Injection vulnerability, allowing remote attackers with administrator privileges to inject and execute arbitrary system commands through a specific functionality provided by SSH and Telnet." } ], "value": "The D-Link DSL6740C modem has an OS Command Injection vulnerability, allowing remote attackers with administrator privileges to inject and execute arbitrary system commands through a specific functionality provided by SSH and Telnet." } ], "impacts": [ { "capecId": "CAPEC-88", "descriptions": [ { "lang": "en", "value": "CAPEC-88 OS Command Injection" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-78", "description": "CWE-78 Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-11T07:45:48.179Z", "orgId": "cded6c7f-6ce5-4948-8f87-aa7a3bbb6b0e", "shortName": "twcert" }, "references": [ { "tags": [ "third-party-advisory" ], "url": "https://www.twcert.org.tw/tw/cp-132-8224-d939e-1.html" }, { "tags": [ "third-party-advisory" ], "url": "https://www.twcert.org.tw/en/cp-139-8231-2432e-2.html" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u0026nbsp; The affected devices are no longer supported for updates. It is recommended to replace the devices.\u003cbr\u003e\u003cbr\u003e\u003cbr\u003e" } ], "value": "The affected devices are no longer supported for updates. It is recommended to replace the devices." } ], "source": { "advisory": "TVN-202411010", "discovery": "EXTERNAL" }, "tags": [ "unsupported-when-assigned" ], "title": "D-Link DSL6740C - OS Command Injection", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "cded6c7f-6ce5-4948-8f87-aa7a3bbb6b0e", "assignerShortName": "twcert", "cveId": "CVE-2024-11065", "datePublished": "2024-11-11T07:45:48.179Z", "dateReserved": "2024-11-11T02:23:34.806Z", "dateUpdated": "2024-11-12T15:41:39.433Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-11066 (GCVE-0-2024-11066)
Vulnerability from cvelistv5
Published
2024-11-11 07:49
Modified
2024-11-24 14:50
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Summary
The D-Link DSL6740C modem has an OS Command Injection vulnerability, allowing remote attackers with administrator privileges to inject and execute arbitrary system commands through the specific web page.
References
▼ | URL | Tags |
---|---|---|
https://www.twcert.org.tw/tw/cp-132-8225-3d882-1.html | third-party-advisory | |
https://www.twcert.org.tw/en/cp-139-8232-5d94e-2.html | third-party-advisory |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:dlink:dsl6740c_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "dsl6740c_firmware", "vendor": "dlink", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-11066", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-12T15:36:45.613717Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-12T15:40:00.657Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-11-24T14:50:34.900Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "url": "https://www.bleepingcomputer.com/news/security/d-link-wont-fix-critical-bug-in-60-000-exposed-eol-modems/" } ], "title": "CVE Program Container", "x_generator": { "engine": "ADPogram 0.0.1" } } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "DSL6740C", "vendor": "D-Link", "versions": [ { "status": "affected", "version": "0" } ] } ], "datePublic": "2024-11-11T07:49:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "The D-Link DSL6740C modem has an OS Command Injection vulnerability, allowing remote attackers with administrator privileges to inject and execute arbitrary system commands through the specific web page." } ], "value": "The D-Link DSL6740C modem has an OS Command Injection vulnerability, allowing remote attackers with administrator privileges to inject and execute arbitrary system commands through the specific web page." } ], "impacts": [ { "capecId": "CAPEC-88", "descriptions": [ { "lang": "en", "value": "CAPEC-88 OS Command Injection" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-78", "description": "CWE-78 Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-11T07:49:38.566Z", "orgId": "cded6c7f-6ce5-4948-8f87-aa7a3bbb6b0e", "shortName": "twcert" }, "references": [ { "tags": [ "third-party-advisory" ], "url": "https://www.twcert.org.tw/tw/cp-132-8225-3d882-1.html" }, { "tags": [ "third-party-advisory" ], "url": "https://www.twcert.org.tw/en/cp-139-8232-5d94e-2.html" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eThe affected devices are no longer supported for updates. It is recommended to replace the devices.\u003c/span\u003e\n\n\u003cbr\u003e" } ], "value": "The affected devices are no longer supported for updates. It is recommended to replace the devices." } ], "source": { "advisory": "TVN-202411011", "discovery": "EXTERNAL" }, "tags": [ "unsupported-when-assigned" ], "title": "D-Link DSL6740C - OS Command Injection", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "cded6c7f-6ce5-4948-8f87-aa7a3bbb6b0e", "assignerShortName": "twcert", "cveId": "CVE-2024-11066", "datePublished": "2024-11-11T07:49:38.566Z", "dateReserved": "2024-11-11T02:23:36.179Z", "dateUpdated": "2024-11-24T14:50:34.900Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-11063 (GCVE-0-2024-11063)
Vulnerability from cvelistv5
Published
2024-11-11 07:30
Modified
2024-11-12 15:42
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Summary
The D-Link DSL6740C modem has an OS Command Injection vulnerability, allowing remote attackers with administrator privileges to inject and execute arbitrary system commands through a specific functionality provided by SSH and Telnet.
References
▼ | URL | Tags |
---|---|---|
https://www.twcert.org.tw/tw/cp-132-8222-eb5bb-1.html | third-party-advisory | |
https://www.twcert.org.tw/en/cp-139-8229-3c2ab-2.html | third-party-advisory |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:dlink:dsl6740c_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "dsl6740c_firmware", "vendor": "dlink", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-11063", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-12T15:37:04.503224Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-12T15:42:11.553Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "DSL6740C", "vendor": "D-Link", "versions": [ { "status": "affected", "version": "0" } ] } ], "datePublic": "2024-11-11T07:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "The D-Link DSL6740C modem has an OS Command Injection vulnerability, allowing remote attackers with administrator privileges to inject and execute arbitrary system commands through a specific functionality provided by SSH and Telnet." } ], "value": "The D-Link DSL6740C modem has an OS Command Injection vulnerability, allowing remote attackers with administrator privileges to inject and execute arbitrary system commands through a specific functionality provided by SSH and Telnet." } ], "impacts": [ { "capecId": "CAPEC-88", "descriptions": [ { "lang": "en", "value": "CAPEC-88 OS Command Injection" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-78", "description": "CWE-78 Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-11T07:35:19.246Z", "orgId": "cded6c7f-6ce5-4948-8f87-aa7a3bbb6b0e", "shortName": "twcert" }, "references": [ { "tags": [ "third-party-advisory" ], "url": "https://www.twcert.org.tw/tw/cp-132-8222-eb5bb-1.html" }, { "tags": [ "third-party-advisory" ], "url": "https://www.twcert.org.tw/en/cp-139-8229-3c2ab-2.html" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eThe affected devices are no longer supported for updates. It is recommended to replace the devices.\u003c/span\u003e\n\n\u003cbr\u003e" } ], "value": "The affected devices are no longer supported for updates. It is recommended to replace the devices." } ], "source": { "advisory": "TVN-202411008", "discovery": "EXTERNAL" }, "tags": [ "unsupported-when-assigned" ], "title": "D-Link DSL6740C - OS Command Injection", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "cded6c7f-6ce5-4948-8f87-aa7a3bbb6b0e", "assignerShortName": "twcert", "cveId": "CVE-2024-11063", "datePublished": "2024-11-11T07:30:21.003Z", "dateReserved": "2024-11-11T02:23:31.975Z", "dateUpdated": "2024-11-12T15:42:11.553Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-11067 (GCVE-0-2024-11067)
Vulnerability from cvelistv5
Published
2024-11-11 08:00
Modified
2024-11-24 14:50
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-23 - Relative Path Traversal
Summary
The D-Link DSL6740C modem has a Path Traversal Vulnerability, allowing unauthenticated remote attackers to exploit this vulnerability to read arbitrary system files. Additionally, since the device's default password is a combination of the MAC address, attackers can obtain the MAC address through this vulnerability and attempt to log in to the device using the default password.
References
▼ | URL | Tags |
---|---|---|
https://www.twcert.org.tw/tw/cp-132-8226-0b07b-1.html | third-party-advisory | |
https://www.twcert.org.tw/en/cp-139-8233-903d9-2.html | third-party-advisory |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:dlink:dsl6740c_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "dsl6740c_firmware", "vendor": "dlink", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-11067", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-12T16:00:08.755626Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-12T16:02:16.988Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-11-24T14:50:55.666Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "url": "https://www.bleepingcomputer.com/news/security/d-link-wont-fix-critical-bug-in-60-000-exposed-eol-modems/" } ], "title": "CVE Program Container", "x_generator": { "engine": "ADPogram 0.0.1" } } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "DSL6740C", "vendor": "D-Link", "versions": [ { "status": "affected", "version": "0" } ] } ], "datePublic": "2024-11-11T07:57:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "The D-Link DSL6740C modem has a Path Traversal Vulnerability, allowing unauthenticated remote attackers to exploit this vulnerability to read arbitrary system files. Additionally, since the device\u0027s default password is a combination of the MAC address, attackers can obtain the MAC address through this vulnerability and attempt to log in to the device using the default password." } ], "value": "The D-Link DSL6740C modem has a Path Traversal Vulnerability, allowing unauthenticated remote attackers to exploit this vulnerability to read arbitrary system files. Additionally, since the device\u0027s default password is a combination of the MAC address, attackers can obtain the MAC address through this vulnerability and attempt to log in to the device using the default password." } ], "impacts": [ { "capecId": "CAPEC-139", "descriptions": [ { "lang": "en", "value": "CAPEC-139 Relative Path Traversal" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-23", "description": "CWE-23 Relative Path Traversal", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-11T08:01:21.109Z", "orgId": "cded6c7f-6ce5-4948-8f87-aa7a3bbb6b0e", "shortName": "twcert" }, "references": [ { "tags": [ "third-party-advisory" ], "url": "https://www.twcert.org.tw/tw/cp-132-8226-0b07b-1.html" }, { "tags": [ "third-party-advisory" ], "url": "https://www.twcert.org.tw/en/cp-139-8233-903d9-2.html" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "The affected devices are no longer supported for updates. It is recommended to replace the devices.\u003cbr\u003e" } ], "value": "The affected devices are no longer supported for updates. It is recommended to replace the devices." } ], "source": { "advisory": "TVN-202411012", "discovery": "EXTERNAL" }, "tags": [ "unsupported-when-assigned" ], "title": "D-Link DSL6740C - Arbitrary File Reading through Path Traversal", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "cded6c7f-6ce5-4948-8f87-aa7a3bbb6b0e", "assignerShortName": "twcert", "cveId": "CVE-2024-11067", "datePublished": "2024-11-11T08:00:59.881Z", "dateReserved": "2024-11-11T02:23:38.981Z", "dateUpdated": "2024-11-24T14:50:55.666Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-11062 (GCVE-0-2024-11062)
Vulnerability from cvelistv5
Published
2024-11-11 07:28
Modified
2024-11-12 15:42
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Summary
The D-Link DSL6740C modem has an OS Command Injection vulnerability, allowing remote attackers with administrator privileges to inject and execute arbitrary system commands through a specific functionality provided by SSH and Telnet.
References
▼ | URL | Tags |
---|---|---|
https://www.twcert.org.tw/tw/cp-132-8221-601c3-1.html | third-party-advisory | |
https://www.twcert.org.tw/en/cp-139-8228-1fbb0-2.html | third-party-advisory |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:dlink:dsl6740c_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "dsl6740c_firmware", "vendor": "dlink", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-11062", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-12T15:37:09.444413Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-12T15:42:27.176Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "DSL6740C", "vendor": "D-Link", "versions": [ { "status": "affected", "version": "0" } ] } ], "datePublic": "2024-11-11T07:27:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eThe D-Link DSL6740C modem has an OS Command Injection vulnerability, allowing remote attackers with administrator privileges to inject and execute arbitrary system commands through a specific functionality provided by SSH and Telnet.\u003c/span\u003e" } ], "value": "The D-Link DSL6740C modem has an OS Command Injection vulnerability, allowing remote attackers with administrator privileges to inject and execute arbitrary system commands through a specific functionality provided by SSH and Telnet." } ], "impacts": [ { "capecId": "CAPEC-88", "descriptions": [ { "lang": "en", "value": "CAPEC-88 OS Command Injection" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-78", "description": "CWE-78 Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-11T07:28:09.879Z", "orgId": "cded6c7f-6ce5-4948-8f87-aa7a3bbb6b0e", "shortName": "twcert" }, "references": [ { "tags": [ "third-party-advisory" ], "url": "https://www.twcert.org.tw/tw/cp-132-8221-601c3-1.html" }, { "tags": [ "third-party-advisory" ], "url": "https://www.twcert.org.tw/en/cp-139-8228-1fbb0-2.html" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eThe affected devices are no longer supported for updates. It is recommended to replace the devices.\u003c/span\u003e\n\n\u003cbr\u003e" } ], "value": "The affected devices are no longer supported for updates. It is recommended to replace the devices." } ], "source": { "advisory": "TVN-202411007", "discovery": "EXTERNAL" }, "tags": [ "unsupported-when-assigned" ], "title": "D-Link DSL6740C - OS Command Injection", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "cded6c7f-6ce5-4948-8f87-aa7a3bbb6b0e", "assignerShortName": "twcert", "cveId": "CVE-2024-11062", "datePublished": "2024-11-11T07:28:09.879Z", "dateReserved": "2024-11-11T02:23:30.360Z", "dateUpdated": "2024-11-12T15:42:27.176Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-11068 (GCVE-0-2024-11068)
Vulnerability from cvelistv5
Published
2024-11-11 08:05
Modified
2024-11-24 14:51
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-648 - Incorrect Use of Privileged APIs
Summary
The D-Link DSL6740C modem has an Incorrect Use of Privileged APIs vulnerability, allowing unauthenticated remote attackers to modify any user’s password by leveraging the API, thereby granting access to Web, SSH, and Telnet services using that user’s account.
References
▼ | URL | Tags |
---|---|---|
https://www.twcert.org.tw/tw/cp-132-8227-f3f3b-1.html | third-party-advisory | |
https://www.twcert.org.tw/en/cp-139-8234-0514c-2.html | third-party-advisory |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:dlink:dsl6740c_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "dsl6740c_firmware", "vendor": "dlink", "versions": [ { "lessThan": "*", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-11068", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-12T16:10:55.895720Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-12T16:11:30.258Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-11-24T14:51:21.810Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "url": "https://www.bleepingcomputer.com/news/security/d-link-wont-fix-critical-bug-in-60-000-exposed-eol-modems/" } ], "title": "CVE Program Container", "x_generator": { "engine": "ADPogram 0.0.1" } } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "DSL6740C", "vendor": "D-Link", "versions": [ { "status": "affected", "version": "0" } ] } ], "datePublic": "2024-11-11T08:03:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u0026nbsp; The D-Link DSL6740C modem has an Incorrect Use of Privileged APIs vulnerability, allowing unauthenticated remote attackers to modify any user\u2019s password by leveraging the API, thereby granting access to Web, SSH, and Telnet services using that user\u2019s account." } ], "value": "The D-Link DSL6740C modem has an Incorrect Use of Privileged APIs vulnerability, allowing unauthenticated remote attackers to modify any user\u2019s password by leveraging the API, thereby granting access to Web, SSH, and Telnet services using that user\u2019s account." } ], "impacts": [ { "capecId": "CAPEC-233", "descriptions": [ { "lang": "en", "value": "CAPEC-233 Privilege Escalation" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-648", "description": "CWE-648 Incorrect Use of Privileged APIs", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-11T08:05:18.980Z", "orgId": "cded6c7f-6ce5-4948-8f87-aa7a3bbb6b0e", "shortName": "twcert" }, "references": [ { "tags": [ "third-party-advisory" ], "url": "https://www.twcert.org.tw/tw/cp-132-8227-f3f3b-1.html" }, { "tags": [ "third-party-advisory" ], "url": "https://www.twcert.org.tw/en/cp-139-8234-0514c-2.html" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eThe affected devices are no longer supported for updates. It is recommended to replace the devices.\u003c/span\u003e\n\n\u003cbr\u003e" } ], "value": "The affected devices are no longer supported for updates. It is recommended to replace the devices." } ], "source": { "advisory": "TVN-202411013", "discovery": "EXTERNAL" }, "tags": [ "unsupported-when-assigned" ], "title": "D-Link DSL6740C - Incorrect Use of Privileged APIs", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "cded6c7f-6ce5-4948-8f87-aa7a3bbb6b0e", "assignerShortName": "twcert", "cveId": "CVE-2024-11068", "datePublished": "2024-11-11T08:05:18.980Z", "dateReserved": "2024-11-11T02:23:40.129Z", "dateUpdated": "2024-11-24T14:51:21.810Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2024-11-11 08:15
Modified
2024-11-15 18:22
Severity ?
Summary
The D-Link DSL6740C modem has an OS Command Injection vulnerability, allowing remote attackers with administrator privileges to inject and execute arbitrary system commands through a specific functionality provided by SSH and Telnet.
References
▼ | URL | Tags | |
---|---|---|---|
twcert@cert.org.tw | https://www.twcert.org.tw/en/cp-139-8231-2432e-2.html | Third Party Advisory | |
twcert@cert.org.tw | https://www.twcert.org.tw/tw/cp-132-8224-d939e-1.html | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
dlink | dsl6740c_firmware | - | |
dlink | dsl6740c | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dlink:dsl6740c_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "702B0914-7B3E-4797-9D28-C1C680EC6668", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dlink:dsl6740c:-:*:*:*:*:*:*:*", "matchCriteriaId": "04466F44-FDB1-4ABF-84F1-C88CC175BCB9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [ { "sourceIdentifier": "twcert@cert.org.tw", "tags": [ "unsupported-when-assigned" ] } ], "descriptions": [ { "lang": "en", "value": "The D-Link DSL6740C modem has an OS Command Injection vulnerability, allowing remote attackers with administrator privileges to inject and execute arbitrary system commands through a specific functionality provided by SSH and Telnet." }, { "lang": "es", "value": "El m\u00f3dem D-Link DSL6740C tiene una vulnerabilidad de inyecci\u00f3n de comandos del sistema operativo, que permite a atacantes remotos con privilegios de administrador inyectar y ejecutar comandos de sistema arbitrarios a trav\u00e9s de una funcionalidad espec\u00edfica proporcionada por SSH y Telnet." } ], "id": "CVE-2024-11065", "lastModified": "2024-11-15T18:22:28.430", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "twcert@cert.org.tw", "type": "Primary" } ] }, "published": "2024-11-11T08:15:07.180", "references": [ { "source": "twcert@cert.org.tw", "tags": [ "Third Party Advisory" ], "url": "https://www.twcert.org.tw/en/cp-139-8231-2432e-2.html" }, { "source": "twcert@cert.org.tw", "tags": [ "Third Party Advisory" ], "url": "https://www.twcert.org.tw/tw/cp-132-8224-d939e-1.html" } ], "sourceIdentifier": "twcert@cert.org.tw", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-78" } ], "source": "twcert@cert.org.tw", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-11-11 08:15
Modified
2024-11-15 18:22
Severity ?
Summary
The D-Link DSL6740C modem has an OS Command Injection vulnerability, allowing remote attackers with administrator privileges to inject and execute arbitrary system commands through a specific functionality provided by SSH and Telnet.
References
▼ | URL | Tags | |
---|---|---|---|
twcert@cert.org.tw | https://www.twcert.org.tw/en/cp-139-8230-11430-2.html | Third Party Advisory | |
twcert@cert.org.tw | https://www.twcert.org.tw/tw/cp-132-8223-f6da0-1.html | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
dlink | dsl6740c_firmware | - | |
dlink | dsl6740c | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dlink:dsl6740c_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "702B0914-7B3E-4797-9D28-C1C680EC6668", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dlink:dsl6740c:-:*:*:*:*:*:*:*", "matchCriteriaId": "04466F44-FDB1-4ABF-84F1-C88CC175BCB9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [ { "sourceIdentifier": "twcert@cert.org.tw", "tags": [ "unsupported-when-assigned" ] } ], "descriptions": [ { "lang": "en", "value": "The D-Link DSL6740C modem has an OS Command Injection vulnerability, allowing remote attackers with administrator privileges to inject and execute arbitrary system commands through a specific functionality provided by SSH and Telnet." }, { "lang": "es", "value": "El m\u00f3dem D-Link DSL6740C tiene una vulnerabilidad de inyecci\u00f3n de comandos del sistema operativo, que permite a atacantes remotos con privilegios de administrador inyectar y ejecutar comandos de sistema arbitrarios a trav\u00e9s de una funcionalidad espec\u00edfica proporcionada por SSH y Telnet." } ], "id": "CVE-2024-11064", "lastModified": "2024-11-15T18:22:07.027", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "twcert@cert.org.tw", "type": "Primary" } ] }, "published": "2024-11-11T08:15:06.653", "references": [ { "source": "twcert@cert.org.tw", "tags": [ "Third Party Advisory" ], "url": "https://www.twcert.org.tw/en/cp-139-8230-11430-2.html" }, { "source": "twcert@cert.org.tw", "tags": [ "Third Party Advisory" ], "url": "https://www.twcert.org.tw/tw/cp-132-8223-f6da0-1.html" } ], "sourceIdentifier": "twcert@cert.org.tw", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-78" } ], "source": "twcert@cert.org.tw", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-11-11 08:15
Modified
2024-11-15 18:21
Severity ?
Summary
The D-Link DSL6740C modem has an OS Command Injection vulnerability, allowing remote attackers with administrator privileges to inject and execute arbitrary system commands through a specific functionality provided by SSH and Telnet.
References
▼ | URL | Tags | |
---|---|---|---|
twcert@cert.org.tw | https://www.twcert.org.tw/en/cp-139-8229-3c2ab-2.html | Third Party Advisory | |
twcert@cert.org.tw | https://www.twcert.org.tw/tw/cp-132-8222-eb5bb-1.html | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
dlink | dsl6740c_firmware | - | |
dlink | dsl6740c | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dlink:dsl6740c_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "702B0914-7B3E-4797-9D28-C1C680EC6668", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dlink:dsl6740c:-:*:*:*:*:*:*:*", "matchCriteriaId": "04466F44-FDB1-4ABF-84F1-C88CC175BCB9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [ { "sourceIdentifier": "twcert@cert.org.tw", "tags": [ "unsupported-when-assigned" ] } ], "descriptions": [ { "lang": "en", "value": "The D-Link DSL6740C modem has an OS Command Injection vulnerability, allowing remote attackers with administrator privileges to inject and execute arbitrary system commands through a specific functionality provided by SSH and Telnet." }, { "lang": "es", "value": "El m\u00f3dem D-Link DSL6740C tiene una vulnerabilidad de inyecci\u00f3n de comandos del sistema operativo, que permite a atacantes remotos con privilegios de administrador inyectar y ejecutar comandos de sistema arbitrarios a trav\u00e9s de una funcionalidad espec\u00edfica proporcionada por SSH y Telnet." } ], "id": "CVE-2024-11063", "lastModified": "2024-11-15T18:21:55.407", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "twcert@cert.org.tw", "type": "Primary" } ] }, "published": "2024-11-11T08:15:06.120", "references": [ { "source": "twcert@cert.org.tw", "tags": [ "Third Party Advisory" ], "url": "https://www.twcert.org.tw/en/cp-139-8229-3c2ab-2.html" }, { "source": "twcert@cert.org.tw", "tags": [ "Third Party Advisory" ], "url": "https://www.twcert.org.tw/tw/cp-132-8222-eb5bb-1.html" } ], "sourceIdentifier": "twcert@cert.org.tw", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-78" } ], "source": "twcert@cert.org.tw", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-11-11 08:15
Modified
2024-11-24 15:15
Severity ?
Summary
The D-Link DSL6740C modem has an OS Command Injection vulnerability, allowing remote attackers with administrator privileges to inject and execute arbitrary system commands through the specific web page.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
dlink | dsl6740c_firmware | - | |
dlink | dsl6740c | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dlink:dsl6740c_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "702B0914-7B3E-4797-9D28-C1C680EC6668", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dlink:dsl6740c:-:*:*:*:*:*:*:*", "matchCriteriaId": "04466F44-FDB1-4ABF-84F1-C88CC175BCB9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [ { "sourceIdentifier": "twcert@cert.org.tw", "tags": [ "unsupported-when-assigned" ] } ], "descriptions": [ { "lang": "en", "value": "The D-Link DSL6740C modem has an OS Command Injection vulnerability, allowing remote attackers with administrator privileges to inject and execute arbitrary system commands through the specific web page." }, { "lang": "es", "value": "El m\u00f3dem D-Link DSL6740C tiene una vulnerabilidad de inyecci\u00f3n de comandos del sistema operativo, que permite a atacantes remotos con privilegios de administrador inyectar y ejecutar comandos de sistema arbitrarios a trav\u00e9s de la p\u00e1gina web espec\u00edfica." } ], "id": "CVE-2024-11066", "lastModified": "2024-11-24T15:15:06.387", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "twcert@cert.org.tw", "type": "Primary" } ] }, "published": "2024-11-11T08:15:07.730", "references": [ { "source": "twcert@cert.org.tw", "tags": [ "Third Party Advisory" ], "url": "https://www.twcert.org.tw/en/cp-139-8232-5d94e-2.html" }, { "source": "twcert@cert.org.tw", "tags": [ "Third Party Advisory" ], "url": "https://www.twcert.org.tw/tw/cp-132-8225-3d882-1.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.bleepingcomputer.com/news/security/d-link-wont-fix-critical-bug-in-60-000-exposed-eol-modems/" } ], "sourceIdentifier": "twcert@cert.org.tw", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-78" } ], "source": "twcert@cert.org.tw", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-11-11 08:15
Modified
2024-11-24 15:15
Severity ?
Summary
The D-Link DSL6740C modem has an Incorrect Use of Privileged APIs vulnerability, allowing unauthenticated remote attackers to modify any user’s password by leveraging the API, thereby granting access to Web, SSH, and Telnet services using that user’s account.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
dlink | dsl6740c_firmware | - | |
dlink | dsl6740c | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dlink:dsl6740c_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "702B0914-7B3E-4797-9D28-C1C680EC6668", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dlink:dsl6740c:-:*:*:*:*:*:*:*", "matchCriteriaId": "04466F44-FDB1-4ABF-84F1-C88CC175BCB9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [ { "sourceIdentifier": "twcert@cert.org.tw", "tags": [ "unsupported-when-assigned" ] } ], "descriptions": [ { "lang": "en", "value": "The D-Link DSL6740C modem has an Incorrect Use of Privileged APIs vulnerability, allowing unauthenticated remote attackers to modify any user\u2019s password by leveraging the API, thereby granting access to Web, SSH, and Telnet services using that user\u2019s account." }, { "lang": "es", "value": "El m\u00f3dem D-Link DSL6740C tiene una vulnerabilidad de uso incorrecto de API privilegiadas, que permite a atacantes remotos no autenticados modificar la contrase\u00f1a de cualquier usuario aprovechando la API, otorgando as\u00ed acceso a servicios web, SSH y Telnet utilizando la cuenta de ese usuario." } ], "id": "CVE-2024-11068", "lastModified": "2024-11-24T15:15:06.707", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "twcert@cert.org.tw", "type": "Primary" } ] }, "published": "2024-11-11T08:15:08.850", "references": [ { "source": "twcert@cert.org.tw", "tags": [ "Third Party Advisory" ], "url": "https://www.twcert.org.tw/en/cp-139-8234-0514c-2.html" }, { "source": "twcert@cert.org.tw", "tags": [ "Third Party Advisory" ], "url": "https://www.twcert.org.tw/tw/cp-132-8227-f3f3b-1.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.bleepingcomputer.com/news/security/d-link-wont-fix-critical-bug-in-60-000-exposed-eol-modems/" } ], "sourceIdentifier": "twcert@cert.org.tw", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-648" } ], "source": "twcert@cert.org.tw", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-11-11 08:15
Modified
2024-11-24 15:15
Severity ?
Summary
The D-Link DSL6740C modem has a Path Traversal Vulnerability, allowing unauthenticated remote attackers to exploit this vulnerability to read arbitrary system files. Additionally, since the device's default password is a combination of the MAC address, attackers can obtain the MAC address through this vulnerability and attempt to log in to the device using the default password.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
dlink | dsl6740c_firmware | - | |
dlink | dsl6740c | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dlink:dsl6740c_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "702B0914-7B3E-4797-9D28-C1C680EC6668", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dlink:dsl6740c:-:*:*:*:*:*:*:*", "matchCriteriaId": "04466F44-FDB1-4ABF-84F1-C88CC175BCB9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [ { "sourceIdentifier": "twcert@cert.org.tw", "tags": [ "unsupported-when-assigned" ] } ], "descriptions": [ { "lang": "en", "value": "The D-Link DSL6740C modem has a Path Traversal Vulnerability, allowing unauthenticated remote attackers to exploit this vulnerability to read arbitrary system files. Additionally, since the device\u0027s default password is a combination of the MAC address, attackers can obtain the MAC address through this vulnerability and attempt to log in to the device using the default password." }, { "lang": "es", "value": "El m\u00f3dem D-Link DSL6740C tiene una vulnerabilidad de Path Traversal, que permite a atacantes remotos no autenticados aprovechar esta vulnerabilidad para leer archivos arbitrarios del sistema. Adem\u00e1s, dado que la contrase\u00f1a predeterminada del dispositivo es una combinaci\u00f3n de la direcci\u00f3n MAC, los atacantes pueden obtener la direcci\u00f3n MAC a trav\u00e9s de esta vulnerabilidad e intentar iniciar sesi\u00f3n en el dispositivo utilizando la contrase\u00f1a predeterminada." } ], "id": "CVE-2024-11067", "lastModified": "2024-11-24T15:15:06.567", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "twcert@cert.org.tw", "type": "Primary" } ] }, "published": "2024-11-11T08:15:08.263", "references": [ { "source": "twcert@cert.org.tw", "tags": [ "Third Party Advisory" ], "url": "https://www.twcert.org.tw/en/cp-139-8233-903d9-2.html" }, { "source": "twcert@cert.org.tw", "tags": [ "Third Party Advisory" ], "url": "https://www.twcert.org.tw/tw/cp-132-8226-0b07b-1.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.bleepingcomputer.com/news/security/d-link-wont-fix-critical-bug-in-60-000-exposed-eol-modems/" } ], "sourceIdentifier": "twcert@cert.org.tw", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-23" } ], "source": "twcert@cert.org.tw", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-11-11 08:15
Modified
2024-11-15 18:21
Severity ?
7.2 (High) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
7.2 (High) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
7.2 (High) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Summary
The D-Link DSL6740C modem has an OS Command Injection vulnerability, allowing remote attackers with administrator privileges to inject and execute arbitrary system commands through a specific functionality provided by SSH and Telnet.
References
▼ | URL | Tags | |
---|---|---|---|
twcert@cert.org.tw | https://www.twcert.org.tw/en/cp-139-8228-1fbb0-2.html | Third Party Advisory | |
twcert@cert.org.tw | https://www.twcert.org.tw/tw/cp-132-8221-601c3-1.html | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
dlink | dsl6740c_firmware | - | |
dlink | dsl6740c | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dlink:dsl6740c_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "702B0914-7B3E-4797-9D28-C1C680EC6668", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dlink:dsl6740c:-:*:*:*:*:*:*:*", "matchCriteriaId": "04466F44-FDB1-4ABF-84F1-C88CC175BCB9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [ { "sourceIdentifier": "twcert@cert.org.tw", "tags": [ "unsupported-when-assigned" ] } ], "descriptions": [ { "lang": "en", "value": "The D-Link DSL6740C modem has an OS Command Injection vulnerability, allowing remote attackers with administrator privileges to inject and execute arbitrary system commands through a specific functionality provided by SSH and Telnet." }, { "lang": "es", "value": "El m\u00f3dem D-Link DSL6740C tiene una vulnerabilidad de inyecci\u00f3n de comandos del sistema operativo, que permite a atacantes remotos con privilegios de administrador inyectar y ejecutar comandos de sistema arbitrarios a trav\u00e9s de una funcionalidad espec\u00edfica proporcionada por SSH y Telnet." } ], "id": "CVE-2024-11062", "lastModified": "2024-11-15T18:21:42.127", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "twcert@cert.org.tw", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-11-11T08:15:05.530", "references": [ { "source": "twcert@cert.org.tw", "tags": [ "Third Party Advisory" ], "url": "https://www.twcert.org.tw/en/cp-139-8228-1fbb0-2.html" }, { "source": "twcert@cert.org.tw", "tags": [ "Third Party Advisory" ], "url": "https://www.twcert.org.tw/tw/cp-132-8221-601c3-1.html" } ], "sourceIdentifier": "twcert@cert.org.tw", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-78" } ], "source": "twcert@cert.org.tw", "type": "Primary" } ] }