D-Link DIR-2640-US 1.01B04 is affected by Insufficiently Protected Credentials. D-Link AC2600(DIR-2640) stores the device system account password in plain text. It does not use linux user management. In addition, the passwords of all devices are the same, and they cannot be modified by normal users. An attacker can easily log in to the target router through the serial port and obtain root privileges.
References
Link | Resource |
---|---|
http://d-link.com | Broken Link |
http://dir-2640-us.com | Broken Link URL Repurposed |
https://github.com/liyansong2018/CVE/tree/main/2021/CVE-2021-34204 | Exploit Third Party Advisory |
https://www.dlink.com/en/security-bulletin/ | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
No history.
Information
Published : 2021-06-16 20:15
Updated : 2024-02-14 01:17
NVD link : CVE-2021-34204
Mitre link : CVE-2021-34204
CVE.ORG link : CVE-2021-34204
JSON object : View
Products Affected
dlink
- dir-2640-us_firmware
- dir-2640-us
CWE
CWE-522
Insufficiently Protected Credentials