2022-08-24 02:47:25 +00:00
id : CVE-2021-42627
info :
2022-08-24 03:19:11 +00:00
name : D-Link DIR-615 - Unauthorized Access
2022-08-24 02:47:25 +00:00
author : For3stCo1d
2022-08-25 07:42:57 +00:00
severity : critical
2022-08-24 02:47:25 +00:00
description : |
2023-04-10 20:24:56 +00:00
D-Link DIR-615 devices with firmware 20.06 are susceptible to unauthorized access. An attacker can access the WAN configuration page wan.htm without authentication, which can lead to disclosure of WAN settings, data modification, and/or other unauthorized operations.
2023-09-06 12:09:01 +00:00
remediation : |
Apply the latest firmware update provided by D-Link to fix the vulnerability and ensure strong and unique passwords are set for router administration.
2022-08-24 02:47:25 +00:00
reference :
- https://github.com/sanjokkarki/D-Link-DIR-615/blob/main/CVE-2021-42627
2022-08-25 07:42:57 +00:00
- https://www.dlink.com/en/security-bulletin/
2023-04-06 19:02:01 +00:00
- https://nvd.nist.gov/vuln/detail/CVE-2021-42627
2023-07-11 19:49:27 +00:00
- http://d-link.com
- http://dlink.com
2022-08-24 08:38:00 +00:00
classification :
2022-08-25 07:42:57 +00:00
cvss-metrics : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score : 9.8
2022-08-24 08:38:00 +00:00
cve-id : CVE-2021-42627
2023-10-14 11:27:55 +00:00
epss-score : 0.05731
2023-11-05 22:23:39 +00:00
epss-percentile : 0.92513
2023-09-06 12:09:01 +00:00
cpe : cpe:2.3:o:dlink:dir-615_firmware:20.06:*:*:*:*:*:*:*
2022-08-24 02:47:25 +00:00
metadata :
2023-06-04 08:13:42 +00:00
verified : true
2023-09-06 12:09:01 +00:00
max-request : 1
2023-07-11 19:49:27 +00:00
vendor : dlink
product : dir-615_firmware
2023-09-06 12:09:01 +00:00
shodan-query : http.title:"Roteador Wireless"
2022-08-25 07:08:49 +00:00
tags : cve,cve2021,d-link,router,unauth,dir-615,roteador
2022-08-24 02:47:25 +00:00
2023-04-27 04:28:59 +00:00
http :
2022-08-24 08:38:00 +00:00
- method : GET
path :
- "{{BaseURL}}/wan.htm"
2022-08-24 02:47:25 +00:00
matchers-condition : and
matchers :
- type : word
part : body
words :
2022-08-24 08:38:00 +00:00
- "src='menu.js?v=\"+Math.random()+\"'></scr\"+\"ipt>\");"
- "var ipv6conntype"
condition : and
2022-08-24 02:52:29 +00:00
2022-08-24 02:47:25 +00:00
- type : word
part : header
words :
- Virtual Web
- type : status
status :
- 200
2023-11-06 09:19:20 +00:00
# digest: 4a0a0047304502210092565e506c4c7fb469a5a03d31418574eb7757b4212c0158908332f5752296c802205a8d37d7898070cfd3f0161aad450db8bdaea8e1dcfeacc85be99812ed018318:922c64590222798bb761d5b6d8e72950