// For flags

CVE-2009-4821

 

Severity Score

9.8
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

The D-Link DIR-615 with firmware 3.10NA does not require administrative authentication for apply.cgi, which allows remote attackers to (1) change the admin password via the admin_password parameter, (2) disable the security requirement for the Wi-Fi network via unspecified vectors, or (3) modify DNS settings via unspecified vectors.

El D-Link DIR-615 con firmware 3.10NA no requiere autenticación de administrador para apply.cgi, lo que permite a atacantes remotos (1) cambiar la contraseña de administrador a través del parámetro "admin_password", (2) deshabilitar el requerimiento de seguridad para la red Wi-Fi mediante vectores no especificados o (3) modificar la configuración DNS mediante vectores no especificados.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
None
Integrity
Partial
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2010-04-27 CVE Reserved
  • 2010-04-27 CVE Published
  • 2024-09-17 CVE Updated
  • 2024-09-17 First Exploit
  • 2025-03-30 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-287: Improper Authentication
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Dlink
Search vendor "Dlink"
Dir-615
Search vendor "Dlink" for product "Dir-615"
3.10na
Search vendor "Dlink" for product "Dir-615" and version "3.10na"
-
Affected