Certain models of D-Link wireless routers do not properly validate user input in the telnet service, allowing unauthenticated remote attackers to use hard-coded credentials to log into telnet and inject arbitrary OS commands, which can then be executed on the device.
History

Thu, 19 Sep 2024 22:00:00 +0000

Type Values Removed Values Added
First Time appeared Dlink dir-x4860
Dlink dir-x4860 Firmware
Weaknesses CWE-798
CPEs cpe:2.3:h:dlink:dir-x4860:a1:*:*:*:*:*:*:*
cpe:2.3:o:dlink:dir-x4860_firmware:1.00:*:*:*:*:*:*:*
cpe:2.3:o:dlink:dir-x4860_firmware:1.04:*:*:*:*:*:*:*
Vendors & Products Dlink dir-x4860
Dlink dir-x4860 Firmware

Mon, 16 Sep 2024 14:30:00 +0000

Type Values Removed Values Added
First Time appeared Dlink
Dlink dir-4860 A1
CPEs cpe:2.3:a:dlink:dir-4860_a1:1.00:*:*:*:*:*:*:*
cpe:2.3:a:dlink:dir-4860_a1:1.04:*:*:*:*:*:*:*
Vendors & Products Dlink
Dlink dir-4860 A1
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 16 Sep 2024 07:00:00 +0000

Type Values Removed Values Added
Description Certain models of D-Link wireless routers do not properly validate user input in the telnet service, allowing unauthenticated remote attackers to use hard-coded credentials to log into telnet and inject arbitrary OS commands, which can then be executed on the device.
Title D-Link WiFi router - OS Command Injection
Weaknesses CWE-78
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: twcert

Published: 2024-09-16T06:52:52.517Z

Updated: 2024-09-16T13:13:03.744Z

Reserved: 2024-09-05T06:13:40.329Z

Link: CVE-2024-45698

cve-icon Vulnrichment

Updated: 2024-09-16T13:12:58.835Z

cve-icon NVD

Status : Analyzed

Published: 2024-09-16T07:15:03.450

Modified: 2024-09-19T21:40:02.560

Link: CVE-2024-45698

cve-icon Redhat

No data.