Certain models of D-Link wireless routers contain an undisclosed factory testing backdoor. Unauthenticated attackers on the local area network can force the device to enable Telnet service by accessing a specific URL and can log in by using the administrator credentials obtained from analyzing the firmware.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
EUVD-2024-47203 | Certain models of D-Link wireless routers contain an undisclosed factory testing backdoor. Unauthenticated attackers on the local area network can force the device to enable Telnet service by accessing a specific URL and can log in by using the administrator credentials obtained from analyzing the firmware. |
Fixes
Solution
Please update firmware of following models to 1.10.01 or later version: G403, G415, G416, M18, R03, R04, R12, R18 Please update firmware of following models to 1.10.02 or later version: E30, M30, M32, M60, R32 Please update firmware of following models to 1.20.01 or later version: E15, R15
Workaround
No workaround given by the vendor.
References
History
No history.

Status: PUBLISHED
Assigner: twcert
Published:
Updated: 2024-08-01T21:25:03.244Z
Reserved: 2024-06-17T01:58:49.676Z
Link: CVE-2024-6045

Updated: 2024-06-24T13:09:29.300Z

Status : Awaiting Analysis
Published: 2024-06-17T04:15:09.287
Modified: 2024-11-21T09:48:50.090
Link: CVE-2024-6045

No data.

No data.