CRITICAL · 9.8

CVE-2017-9542

D-Link DIR-615 Wireless N 300 Router allows authentication bypass via a modified POST request to login.cgi. This issue occurs because it fails to validate the password field. Successful exploitation o...

Vulnerability Description

D-Link DIR-615 Wireless N 300 Router allows authentication bypass via a modified POST request to login.cgi. This issue occurs because it fails to validate the password field. Successful exploitation of this issue allows an attacker to take control of the affected device.

CVSS Score

9.8

CRITICAL

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
HIGH
Availability
HIGH

Affected Products

VendorProductVersions
D-LinkDir-615 FirmwareAll versions
DlinkDir-615-

Related Weaknesses (CWE)

References

FAQ

What is CVE-2017-9542?

CVE-2017-9542 is a vulnerability with a CVSS score of 9.8 (CRITICAL). D-Link DIR-615 Wireless N 300 Router allows authentication bypass via a modified POST request to login.cgi. This issue occurs because it fails to validate the password field. Successful exploitation o...

How severe is CVE-2017-9542?

CVE-2017-9542 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.

Is there a patch for CVE-2017-9542?

Check the references section above for vendor advisories and patch information. Affected products include: D-Link Dir-615 Firmware, Dlink Dir-615.