Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2021-42627

4 documents4 sources
Severity
9.8CRITICAL
EPSS
74.3%
top 1.16%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedAug 23
Latest updateAug 24

Description

The WAN configuration page "wan.htm" on D-Link DIR-615 devices with firmware 20.06 can be accessed directly without authentication which can lead to disclose the information about WAN settings and also leverage attacker to modify the data fields of page.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages4 packages

🔴Vulnerability Details

2
GHSA
GHSA-v9x5-7566-775w: The WAN configuration page "wan2022-08-24
CVEList
CVE-2021-42627: The WAN configuration page "wan2022-08-23

💥Exploits & PoCs

1
Nuclei
D-Link DIR-615 - Unauthorized Access
CVE-2021-42627 (CRITICAL CVSS 9.8) | The WAN configuration page "wan.htm | cvebase.io