Vulnerability Description
On D-Link DIR-605L devices, firmware before 2.08UIBetaB01.bin allows an unauthenticated GET request to trigger a reboot.
CVSS Score
7.5
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Dlink | Dir-605L Firmware | 2.08b01 |
| Dlink | Dir-605L | - |
Related Weaknesses (CWE)
References
- ftp://ftp2.dlink.com/SECURITY_ADVISEMENTS/DIR-605L/REVB/DIR-605L_REVB_RELEASE_NOVendor Advisory
- http://www.securityfocus.com/bid/99084Third Party AdvisoryVDB Entry
- https://www.exploit-db.com/exploits/43147/
- ftp://ftp2.dlink.com/SECURITY_ADVISEMENTS/DIR-605L/REVB/DIR-605L_REVB_RELEASE_NOVendor Advisory
- http://www.securityfocus.com/bid/99084Third Party AdvisoryVDB Entry
- https://www.exploit-db.com/exploits/43147/
FAQ
What is CVE-2017-9675?
CVE-2017-9675 is a vulnerability with a CVSS score of 7.5 (HIGH). On D-Link DIR-605L devices, firmware before 2.08UIBetaB01.bin allows an unauthenticated GET request to trigger a reboot.
How severe is CVE-2017-9675?
CVE-2017-9675 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-9675?
Check the references section above for vendor advisories and patch information. Affected products include: Dlink Dir-605L Firmware, Dlink Dir-605L.