← Back to CVEs
CVE-2009-4821
N/ADescription
The D-Link DIR-615 with firmware 3.10NA does not require administrative authentication for apply.cgi, which allows remote attackers to (1) change the admin password via the admin_password parameter, (2) disable the security requirement for the Wi-Fi network via unspecified vectors, or (3) modify DNS settings via unspecified vectors.
CVE Details
CVSS v3.1 ScoreN/A
Published4/27/2010
Last Modified4/29/2026
Sourcenvd
Honeypot Sightings0
Affected Products
dlink:dir-615
Weaknesses (CWE)
CWE-287
References
http://secunia.com/advisories/37777(cve@mitre.org)
http://www.securityfocus.com/bid/37415(cve@mitre.org)
http://secunia.com/advisories/37777(af854a3a-2127-422b-91ae-364da2661108)
http://www.hiredhacker.com/2009/12/15/d-link-dir-615-remote-exploit/(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/37415(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.