CVE-2009-4821
 
Severity Score
5.0
*CVSS v2
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
1
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
The D-Link DIR-615 with firmware 3.10NA does not require administrative authentication for apply.cgi, which allows remote attackers to (1) change the admin password via the admin_password parameter, (2) disable the security requirement for the Wi-Fi network via unspecified vectors, or (3) modify DNS settings via unspecified vectors.
El D-Link DIR-615 con firmware 3.10NA no requiere autenticación de administrador para apply.cgi, lo que permite a atacantes remotos (1) cambiar la contraseña de administrador a través del parámetro "admin_password", (2) deshabilitar el requerimiento de seguridad para la red Wi-Fi mediante vectores no especificados o (3) modificar la configuración DNS mediante vectores no especificados.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2010-04-27 CVE Reserved
- 2010-04-27 CVE Published
- 2024-09-17 CVE Updated
- 2024-09-17 EPSS Updated
- 2024-09-17 First Exploit
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-287: Improper Authentication
CAPEC
References (3)
URL | Tag | Source |
---|---|---|
http://www.securityfocus.com/bid/37415 | Vdb Entry |
URL | Date | SRC |
---|---|---|
http://www.hiredhacker.com/2009/12/15/d-link-dir-615-remote-exploit | 2024-09-17 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://secunia.com/advisories/37777 | 2010-04-28 |