The WAN configuration page "wan.htm" on D-Link DIR-615 devices with firmware 20.06 can be accessed directly without authentication which can lead to disclose the information about WAN settings and also leverage attacker to modify the data fields of page.
References
| Link | Resource |
|---|---|
| https://www.dlink.com/en/security-bulletin/ | Vendor Advisory |
| https://github.com/sanjokkarki/D-Link-DIR-615/blob/main/CVE-2021-42627 | Third Party Advisory |
| http://d-link.com | Broken Link |
| http://dlink.com | Product |
Configurations
Configuration 1 (hide)
| AND |
|
Configuration 2 (hide)
| AND |
|
Configuration 3 (hide)
| AND |
|
Configuration 4 (hide)
| AND |
|
History
26 Apr 2023, 18:55
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:h:dlink:dir-615:-:*:*:*:*:*:*:* | |
| First Time |
Dlink dir-615
|
Information
Published : 2022-08-23 12:15
Updated : 2023-04-26 18:55
NVD link : CVE-2021-42627
Mitre link : CVE-2021-42627
JSON object : View
Products Affected
dlink
- dir-615_j1
- dir-615_firmware
- dir-615jx10
- dir-615_j1_firmware
- dir-615
- dir-615_t1
- dir-615jx10_firmware
- dir-615_t1_firmware
CWE
