The D-Link DIR-615 with firmware 3.10NA does not require administrative authentication for apply.cgi, which allows remote attackers to (1) change the admin password via the admin_password parameter, (2) disable the security requirement for the Wi-Fi network via unspecified vectors, or (3) modify DNS settings via unspecified vectors.
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/37415 | vdb entry |
http://secunia.com/advisories/37777 | third party advisory vendor advisory |
http://www.hiredhacker.com/2009/12/15/d-link-dir-615-remote-exploit/ | exploit |