Vulnerability Description
On D-Link DIR-615 devices, a normal user is able to create a root(admin) user from the D-Link portal.
CVSS Score
6.5
MEDIUM
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Dlink | Dir-615 T1 Firmware | 20.07 |
| Dlink | Dir-615 T1 | - |
References
- http://seclists.org/fulldisclosure/2019/Dec/35ExploitMailing ListThird Party Advisory
- https://pastebin.com/wHiRGdEGExploitThird Party Advisory
- https://www.dlink.com/en/security-bulletinVendor Advisory
- https://www.exploit-db.com/exploits/47778ExploitThird Party AdvisoryVDB Entry
- https://www.infosecsanyam.blogspot.com/2019/12/d-link-dir-615-wireless-routerverBroken Link
- http://seclists.org/fulldisclosure/2019/Dec/35ExploitMailing ListThird Party Advisory
- https://pastebin.com/wHiRGdEGExploitThird Party Advisory
- https://www.dlink.com/en/security-bulletinVendor Advisory
- https://www.exploit-db.com/exploits/47778ExploitThird Party AdvisoryVDB Entry
- https://www.infosecsanyam.blogspot.com/2019/12/d-link-dir-615-wireless-routerverBroken Link
FAQ
What is CVE-2019-19743?
CVE-2019-19743 is a vulnerability with a CVSS score of 6.5 (MEDIUM). On D-Link DIR-615 devices, a normal user is able to create a root(admin) user from the D-Link portal.
How severe is CVE-2019-19743?
CVE-2019-19743 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-19743?
Check the references section above for vendor advisories and patch information. Affected products include: Dlink Dir-615 T1 Firmware, Dlink Dir-615 T1.