⚠ Actively exploited
Added to CISA KEV on 2024-05-16. Federal agencies required to patch by 2024-06-06. Required action: This vulnerability affects legacy D-Link products. All associated hardware revisions have reached their end-of-life (EOL) or end-of-service (EOS) life cycle and should be retired and replaced per vendor instructions..
CVE-2021-40655 — Incorrect Authorization in Dlink Dir-605l Firmware
Severity
7.5HIGHNVD
EPSS
92.6%
top 0.26%
CISA KEV
KEV
Added 2024-05-16
Due 2024-06-06
Exploit
Exploited in wild
Active exploitation observed
Affected products
Timeline
PublishedSep 24
KEV addedMay 16
KEV dueJun 6
Latest updateFeb 5
CISA Required Action: This vulnerability affects legacy D-Link products. All associated hardware revisions have reached their end-of-life (EOL) or end-of-service (EOS) life cycle and should be retired and replaced per vendor instructions.
Description
An informtion disclosure issue exists in D-LINK-DIR-605 B2 Firmware Version : 2.01MT. An attacker can obtain a user name and password by forging a post request to the / getcfg.php page
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:NExploitability: 3.9 | Impact: 3.6
Affected Packages1 packages
🔴Vulnerability Details
3💥Exploits & PoCs
1Nuclei▶
D-Link DIR-605 - Information Disclosure
🔍Detection Rules
1Suricata▶
ET WEB_SPECIFIC_APPS D-Link DIR-605 getcfg.php Authentication Bypass Attempt (CVE-2021-40655)↗2025-02-05