Vulnerability Description
D-Link DIR-615 Wireless N 300 Router allows authentication bypass via a modified POST request to login.cgi. This issue occurs because it fails to validate the password field. Successful exploitation of this issue allows an attacker to take control of the affected device.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| D-Link | Dir-615 Firmware | All versions |
| Dlink | Dir-615 | - |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/bid/98992Third Party AdvisoryVDB Entry
- https://twitter.com/tiger_tigerboy/status/873458088321220609Third Party Advisory
- https://www.facebook.com/tigerBOY777/videos/1368513696568992/Permissions Required
- http://www.securityfocus.com/bid/98992Third Party AdvisoryVDB Entry
- https://twitter.com/tiger_tigerboy/status/873458088321220609Third Party Advisory
- https://www.facebook.com/tigerBOY777/videos/1368513696568992/Permissions Required
FAQ
What is CVE-2017-9542?
CVE-2017-9542 is a vulnerability with a CVSS score of 9.8 (CRITICAL). D-Link DIR-615 Wireless N 300 Router allows authentication bypass via a modified POST request to login.cgi. This issue occurs because it fails to validate the password field. Successful exploitation o...
How severe is CVE-2017-9542?
CVE-2017-9542 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2017-9542?
Check the references section above for vendor advisories and patch information. Affected products include: D-Link Dir-615 Firmware, Dlink Dir-615.