Vulnerability Description
An issue was discovered on D-Link DIR-601 2.02NA devices. Being local to the network and having only "User" account (which is a low privilege account) access, an attacker can intercept the response from a POST request to obtain "Admin" rights due to the admin password being displayed in XML.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Dlink | Dir-601 Firmware | 2.02na |
| Dlink | Dir-601 | - |
Related Weaknesses (CWE)
References
- http://seclists.org/fulldisclosure/2018/Aug/45Mailing ListThird Party Advisory
- https://www.exploit-db.com/exploits/45306/ExploitThird Party AdvisoryVDB Entry
- http://seclists.org/fulldisclosure/2018/Aug/45Mailing ListThird Party Advisory
- https://www.exploit-db.com/exploits/45306/ExploitThird Party AdvisoryVDB Entry
FAQ
What is CVE-2018-12710?
CVE-2018-12710 is a vulnerability with a CVSS score of 8.0 (HIGH). An issue was discovered on D-Link DIR-601 2.02NA devices. Being local to the network and having only "User" account (which is a low privilege account) access, an attacker can intercept the response fr...
How severe is CVE-2018-12710?
CVE-2018-12710 has been rated HIGH with a CVSS base score of 8.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-12710?
Check the references section above for vendor advisories and patch information. Affected products include: Dlink Dir-601 Firmware, Dlink Dir-601.