Metrics
Affected Vendors & Products
Tue, 15 Oct 2024 10:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
cvssV3_1
|
cvssV3_1
|
Thu, 19 Sep 2024 22:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Dlink dir-x4860
Dlink dir-x4860 Firmware |
|
Weaknesses | CWE-798 | |
CPEs | cpe:2.3:h:dlink:dir-x4860:a1:*:*:*:*:*:*:* cpe:2.3:o:dlink:dir-x4860_firmware:1.00:*:*:*:*:*:*:* cpe:2.3:o:dlink:dir-x4860_firmware:1.04:*:*:*:*:*:*:* |
|
Vendors & Products |
Dlink dir-x4860
Dlink dir-x4860 Firmware |
Mon, 16 Sep 2024 14:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Dlink
Dlink dir-4860 A1 |
|
CPEs | cpe:2.3:a:dlink:dir-4860_a1:1.00:*:*:*:*:*:*:* cpe:2.3:a:dlink:dir-4860_a1:1.04:*:*:*:*:*:*:* |
|
Vendors & Products |
Dlink
Dlink dir-4860 A1 |
|
Metrics |
ssvc
|
Mon, 16 Sep 2024 07:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Certain models of D-Link wireless routers do not properly validate user input in the telnet service, allowing unauthenticated remote attackers to use hard-coded credentials to log into telnet and inject arbitrary OS commands, which can then be executed on the device. | |
Title | D-Link WiFi router - OS Command Injection | |
Weaknesses | CWE-78 | |
References |
| |
Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: twcert
Published: 2024-09-16T06:52:52.517Z
Updated: 2024-10-15T10:03:35.382Z
Reserved: 2024-09-05T06:13:40.329Z
Link: CVE-2024-45698
Updated: 2024-09-16T13:12:58.835Z
Status : Modified
Published: 2024-09-16T07:15:03.450
Modified: 2024-10-15T10:15:02.853
Link: CVE-2024-45698
No data.