Description
Certain models of D-Link wireless routers contain an undisclosed factory testing backdoor. Unauthenticated attackers on the local area network can force the device to enable Telnet service by accessing a specific URL and can log in by using the administrator credentials obtained from analyzing the firmware.
Published: 2024-06-17
Score: 8.8 High
EPSS: 7.6% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

Vendor Solution

Please update firmware of following models to 1.10.01 or later version: G403, G415, G416, M18, R03, R04, R12, R18 Please update firmware of following models to 1.10.02 or later version: E30, M30, M32, M60, R32 Please update firmware of following models to 1.20.01 or later version: E15, R15

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2024-47203 Certain models of D-Link wireless routers contain an undisclosed factory testing backdoor. Unauthenticated attackers on the local area network can force the device to enable Telnet service by accessing a specific URL and can log in by using the administrator credentials obtained from analyzing the firmware.
History

No history.

Subscriptions

Dlink E15 Firmware E30 Firmware G403 Firmware G415 Firmware G416 Firmware M18 Firmware M30 Firmware M32 Firmware M60 Firmware R03 Firmware R04 Firmware R12 Firmware R15 Firmware R18 Firmware R32 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: twcert

Published:

Updated: 2024-08-01T21:25:03.244Z

Reserved: 2024-06-17T01:58:49.676Z

Link: CVE-2024-6045

cve-icon Vulnrichment

Updated: 2024-06-24T13:09:29.300Z

cve-icon NVD

Status : Deferred

Published: 2024-06-17T04:15:09.287

Modified: 2026-04-15T00:35:42.020

Link: CVE-2024-6045

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses