Severity
9.8CRITICAL
EPSS
1.9%
top 16.62%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 16

Description

Certain models of D-Link wireless routers do not properly validate user input in the telnet service, allowing unauthenticated remote attackers to use hard-coded credentials to log into telnet and inject arbitrary OS commands, which can then be executed on the device.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages2 packages

CVEListV5d-link/dir-x4860_a11.00, 1.04+1
NVDdlink/dir-x4860_firmware1.00, 1.04+1

🔴Vulnerability Details

2
GHSA
GHSA-xj9g-c23g-r4pj: Certain models of D-Link wireless routers do not properly validate user input in the telnet service, allowing unauthenticated remote attackers to use2024-09-16
CVEList
D-Link WiFi router - OS Command Injection2024-09-16

🕵️Threat Intelligence

1
Bleepingcomputer
D-Link fixes critical RCE, hardcoded password flaws in WiFi 6 routers2024-09-16