Vulnerability CVE-2018-5708


Published: 2018-03-30

Description:
An issue was discovered on D-Link DIR-601 B1 2.02NA devices. Being on the same local network as, but being unauthenticated to, the administrator's panel, a user can obtain the admin username and cleartext password in the response (specifically, the configuration file restore_default), which is displayed in XML.

See advisories in our WLB2 database:
Topic
Author
Date
Med.
DLink DIR-601 Admin Password Disclosure
Kevin Randall
02.04.2018

Type:

CWE-522

(Insufficiently Protected Credentials)

CVSS2 => (AV:A/AC:L/Au:N/C:C/I:N/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
6.1/10
6.9/10
6.5/10
Exploit range
Attack complexity
Authentication
Adjacent network
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Complete
None
None
Affected software
Dlink -> Dir-601 firmware 

 References:
http://seclists.org/fulldisclosure/2018/Mar/66
https://securityadvisories.dlink.com/announcement/publication.aspx?name=SAP10111
https://www.exploit-db.com/exploits/44388/

Copyright 2024, cxsecurity.com

 

Back to Top