← Back to CVEs
CVE-2021-39615
CRITICAL9.8
Description
D-Link DSR-500N version 1.02 contains hard-coded credentials for undocumented user accounts in the '/etc/passwd' file.If an attacker succeeds in recovering the cleartext password of the identified hash value, he will be able to log in via SSH or Telnet and thus gain access to the underlying embedded Linux operating system on the device. Fixed in version 2.12/2. NOTE: This vulnerability only affects products that are no longer supported by the maintainer
CVE Details
CVSS v3.1 Score9.8
SeverityCRITICAL
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published8/23/2021
Last Modified11/21/2024
Sourcenvd
Honeypot Sightings0
Affected Products
dlink:dsr-500ndlink:dsr-500n_firmware
Weaknesses (CWE)
CWE-798
References
https://www.dlink.com/en/security-bulletin/(cve@mitre.org)
https://www.nussko.com/advisories/advisory-2021-08-02.txt(cve@mitre.org)
https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10235(af854a3a-2127-422b-91ae-364da2661108)
https://www.dlink.com/en/security-bulletin/(af854a3a-2127-422b-91ae-364da2661108)
https://www.nussko.com/advisories/advisory-2021-08-02.txt(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.