var-201805-0232
Vulnerability from variot

D-Link DIR-601 A1 1.02NA devices do not require the old password for a password change, which occurs in cleartext. D-Link DIR-601 Contains vulnerabilities related to certificate and password management.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. D-LinkDIR-601 is a wireless router product from D-Link. A security vulnerability exists in the D-LinkDIR-601A11.02NA release, which is caused by the fact that the user does not need the current password when changing the password and the program passes the new username and password in clear text. An attacker could exploit the vulnerability to obtain information by intercepting passed parameters. There is a security vulnerability in D-Link DIR-601 A1 version 1.02NA.


[Additional Information] Insecure Authentication Practices in D-LINK DIR-601 Router, Hardware version A1, Firmware Version 1.02NA

When logging into the router, the authentication module passes the username and password BASE64 encoded vice encrypted. There is also no support for HTTPS connections to the router.

Due to no schedule viability D-Link asks that two items are mentioned in disclosure:

a) For this out of service router, users are encouraged too used DD-WRT firmware here http://www.dd-wrt.com/site/support/router-database b) They can contact support@dlink.com for the latest information on updates.


[VulnerabilityType Other] Weak Authentication and No HTTPS support


[Vendor of Product] D-Link


[Affected Product Code Base] DIR 601 - Hardware A1, Firmware 1.02NA


[Affected Component] Login, Password Changing


[Attack Type] Context-dependent


[Impact Information Disclosure] true


[Attack Vectors] To exploit this, an attacker must have a proxy or man-in-the-middle attack completed and be able to discern the URLs to intercept passed parameters.


[Has vendor confirmed or acknowledged the vulnerability?] true


[Remediation] Due to no schedule viability D-Link asks that two items are mentioned in disclosure:

a) For this out of service router, users are encouraged too used DD-WRT firmware here b) They can contact support@dlink.com for the latest information on updates.


[References] http://us.dlink.com/security-advisories/ http://us.dlink.com/security-advisories/ https://advancedpersistentsecurity.net/cve-2018-10641/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10641

Joe Gray

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201805-0232",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "dir-601",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "dlink",
        "version": "1.02na"
      },
      {
        "model": "dir-601",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "d link",
        "version": "a1 1.02na"
      },
      {
        "model": "dir-601 a1 1.02na",
        "scope": null,
        "trust": 0.6,
        "vendor": "d link",
        "version": null
      },
      {
        "model": "dir-601",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "d link",
        "version": "1.02na"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2018-09185"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-004887"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201805-187"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-10641"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/o:d-link:dir-601_firmware",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-004887"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Joe Gray",
    "sources": [
      {
        "db": "PACKETSTORM",
        "id": "147499"
      }
    ],
    "trust": 0.1
  },
  "cve": "CVE-2018-10641",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "CVE-2018-10641",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 1.9,
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "NONE",
            "baseScore": 5.0,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "CNVD-2018-09185",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "VHN-120421",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "author": "nvd@nist.gov",
            "availabilityImpact": "HIGH",
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 2.2,
            "id": "CVE-2018-10641",
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.8,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2018-10641",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "NVD",
            "id": "CVE-2018-10641",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2018-09185",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201805-187",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-120421",
            "trust": 0.1,
            "value": "MEDIUM"
          },
          {
            "author": "VULMON",
            "id": "CVE-2018-10641",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2018-09185"
      },
      {
        "db": "VULHUB",
        "id": "VHN-120421"
      },
      {
        "db": "VULMON",
        "id": "CVE-2018-10641"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-004887"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201805-187"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-10641"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "D-Link DIR-601 A1 1.02NA devices do not require the old password for a password change, which occurs in cleartext. D-Link DIR-601 Contains vulnerabilities related to certificate and password management.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. D-LinkDIR-601 is a wireless router product from D-Link. A security vulnerability exists in the D-LinkDIR-601A11.02NA release, which is caused by the fact that the user does not need the current password when changing the password and the program passes the new username and password in clear text. An attacker could exploit the vulnerability to obtain information by intercepting passed parameters. There is a security vulnerability in D-Link DIR-601 A1 version 1.02NA. \n\n ------------------------------------------\n\n [Additional Information]\n Insecure Authentication Practices in D-LINK DIR-601 Router, Hardware\nversion A1, Firmware Version 1.02NA\n\n When logging into the router, the authentication module passes the\n username and password BASE64 encoded vice encrypted. There is also no support for\n HTTPS connections to the router. \n\n Due to no schedule viability D-Link asks that two items are mentioned in\ndisclosure:\n\n a) For this out of service router, users are encouraged too used DD-WRT\nfirmware here \u003chttp://www.dd-wrt.com/site/support/router-database\u003e\n b) They can contact support@dlink.com for the latest information on\nupdates. \n\n ------------------------------------------\n\n [VulnerabilityType Other]\n Weak Authentication and No HTTPS support\n\n ------------------------------------------\n\n [Vendor of Product]\n D-Link\n\n ------------------------------------------\n\n [Affected Product Code Base]\n DIR 601 - Hardware A1, Firmware 1.02NA\n\n ------------------------------------------\n\n [Affected Component]\n Login, Password Changing\n\n ------------------------------------------\n\n [Attack Type]\n Context-dependent\n\n ------------------------------------------\n\n [Impact Information Disclosure]\n true\n\n ------------------------------------------\n\n [Attack Vectors]\n To exploit this, an attacker must have a proxy or man-in-the-middle attack\ncompleted and be able to discern the URLs to intercept passed parameters. \n\n ------------------------------------------\n\n [Has vendor confirmed or acknowledged the vulnerability?]\n true\n\n ------------------------------------------\n\n [Remediation]\n Due to no schedule viability D-Link asks that two items are mentioned in\ndisclosure:\n\n a) For this out of service router, users are encouraged too used DD-WRT\nfirmware here\n b) They can contact support@dlink.com for the latest information on\nupdates. \n\n ------------------------------------------\n [References]\n http://us.dlink.com/security-advisories/\n\u003chttp://us.dlink.com/security-advisories/\u003e\n https://advancedpersistentsecurity.net/cve-2018-10641/\n https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10641\n\n\n\nJoe Gray\n\n\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2018-10641"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-004887"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-09185"
      },
      {
        "db": "VULHUB",
        "id": "VHN-120421"
      },
      {
        "db": "VULMON",
        "id": "CVE-2018-10641"
      },
      {
        "db": "PACKETSTORM",
        "id": "147499"
      }
    ],
    "trust": 2.43
  },
  "exploit_availability": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "reference": "https://www.scap.org.cn/vuln/vhn-120421",
        "trust": 0.1,
        "type": "unknown"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-120421"
      }
    ]
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2018-10641",
        "trust": 3.3
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-004887",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201805-187",
        "trust": 0.7
      },
      {
        "db": "CNVD",
        "id": "CNVD-2018-09185",
        "trust": 0.6
      },
      {
        "db": "PACKETSTORM",
        "id": "147499",
        "trust": 0.2
      },
      {
        "db": "VULHUB",
        "id": "VHN-120421",
        "trust": 0.1
      },
      {
        "db": "VULMON",
        "id": "CVE-2018-10641",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2018-09185"
      },
      {
        "db": "VULHUB",
        "id": "VHN-120421"
      },
      {
        "db": "VULMON",
        "id": "CVE-2018-10641"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-004887"
      },
      {
        "db": "PACKETSTORM",
        "id": "147499"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201805-187"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-10641"
      }
    ]
  },
  "id": "VAR-201805-0232",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2018-09185"
      },
      {
        "db": "VULHUB",
        "id": "VHN-120421"
      }
    ],
    "trust": 1.48703705
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "IoT",
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2018-09185"
      }
    ]
  },
  "last_update_date": "2024-11-23T22:30:27.093000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "DIR-601",
        "trust": 0.8,
        "url": "http://support.dlink.com/ProductInfo.aspx?m=DIR-601"
      },
      {
        "title": "Awesome CVE PoC",
        "trust": 0.1,
        "url": "https://github.com/lnick2023/nicenice "
      },
      {
        "title": "Awesome CVE PoC",
        "trust": 0.1,
        "url": "https://github.com/xbl3/awesome-cve-poc_qazbnm456 "
      },
      {
        "title": "Awesome CVE PoC",
        "trust": 0.1,
        "url": "https://github.com/qazbnm456/awesome-cve-poc "
      }
    ],
    "sources": [
      {
        "db": "VULMON",
        "id": "CVE-2018-10641"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-004887"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-287",
        "trust": 1.1
      },
      {
        "problemtype": "CWE-255",
        "trust": 0.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-120421"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-004887"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-10641"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 3.3,
        "url": "https://advancedpersistentsecurity.net/cve-2018-10641/"
      },
      {
        "trust": 1.8,
        "url": "https://gist.github.com/jocephus/806ff4679cf54af130d69777a551f819"
      },
      {
        "trust": 1.8,
        "url": "https://www.peerlyst.com/posts/vulnerability-disclosure-insecure-authentication-practices-in-d-link-router-cve-2018-10641-joe-gray"
      },
      {
        "trust": 0.9,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-10641"
      },
      {
        "trust": 0.9,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-10641"
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/287.html"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      },
      {
        "trust": 0.1,
        "url": "https://github.com/lnick2023/nicenice"
      },
      {
        "trust": 0.1,
        "url": "https://github.com/qazbnm456/awesome-cve-poc"
      },
      {
        "trust": 0.1,
        "url": "http://www.dd-wrt.com/site/support/router-database\u003e"
      },
      {
        "trust": 0.1,
        "url": "http://us.dlink.com/security-advisories/\u003e"
      },
      {
        "trust": 0.1,
        "url": "http://us.dlink.com/security-advisories/"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2018-09185"
      },
      {
        "db": "VULHUB",
        "id": "VHN-120421"
      },
      {
        "db": "VULMON",
        "id": "CVE-2018-10641"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-004887"
      },
      {
        "db": "PACKETSTORM",
        "id": "147499"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201805-187"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-10641"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2018-09185"
      },
      {
        "db": "VULHUB",
        "id": "VHN-120421"
      },
      {
        "db": "VULMON",
        "id": "CVE-2018-10641"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-004887"
      },
      {
        "db": "PACKETSTORM",
        "id": "147499"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201805-187"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-10641"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2018-05-09T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2018-09185"
      },
      {
        "date": "2018-05-04T00:00:00",
        "db": "VULHUB",
        "id": "VHN-120421"
      },
      {
        "date": "2018-05-04T00:00:00",
        "db": "VULMON",
        "id": "CVE-2018-10641"
      },
      {
        "date": "2018-06-29T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2018-004887"
      },
      {
        "date": "2018-05-04T17:39:19",
        "db": "PACKETSTORM",
        "id": "147499"
      },
      {
        "date": "2018-05-07T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201805-187"
      },
      {
        "date": "2018-05-04T03:29:00.350000",
        "db": "NVD",
        "id": "CVE-2018-10641"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2018-05-09T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2018-09185"
      },
      {
        "date": "2019-10-03T00:00:00",
        "db": "VULHUB",
        "id": "VHN-120421"
      },
      {
        "date": "2023-04-26T00:00:00",
        "db": "VULMON",
        "id": "CVE-2018-10641"
      },
      {
        "date": "2018-06-29T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2018-004887"
      },
      {
        "date": "2019-10-23T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201805-187"
      },
      {
        "date": "2024-11-21T03:41:42.870000",
        "db": "NVD",
        "id": "CVE-2018-10641"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201805-187"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "D-Link DIR-601 Vulnerabilities related to certificate and password management",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-004887"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "authorization issue",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201805-187"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…