Dlink Dir-2640-Us Firmware vulnerabilities
7 known vulnerabilities affecting dlink/dir-2640-us_firmware.
Total CVEs
7
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
HIGH5MEDIUM2
Vulnerabilities
Page 1 of 1
CVE-2021-20132HIGHCVSS 8.8≤ 1.11b022021-12-30
CVE-2021-20132 [HIGH] CWE-798 CVE-2021-20132: Quagga Services on D-Link DIR-2640 less than or equal to version 1.11B02 use default hard-coded cred
Quagga Services on D-Link DIR-2640 less than or equal to version 1.11B02 use default hard-coded credentials, which can allow a remote attacker to gain administrative access to the zebra or ripd those services. Both are running with root privileges on the router (i.e., as the "admin" user, UID 0).
nvd
CVE-2021-20134HIGHCVSS 8.4≤ 1.11b022021-12-30
CVE-2021-20134 [HIGH] CWE-22 CVE-2021-20134: Quagga Services on D-Link DIR-2640 less than or equal to version 1.11B02 are affected by an absolute
Quagga Services on D-Link DIR-2640 less than or equal to version 1.11B02 are affected by an absolute path traversal vulnerability that allows a remote, authenticated attacker to set an arbitrary file on the router's filesystem as the log file used by either Quagga service (zebra or ripd). Subsequent log messages will be appended to the file, prefixed b
nvd
CVE-2021-20133MEDIUMCVSS 6.1≤ 1.11b022021-12-30
CVE-2021-20133 [MEDIUM] CWE-22 CVE-2021-20133: Quagga Services on D-Link DIR-2640 less than or equal to version 1.11B02 are affected by an absolute
Quagga Services on D-Link DIR-2640 less than or equal to version 1.11B02 are affected by an absolute path traversal vulnerability that allows a remote, authenticated attacker to set the "message of the day" banner to any file on the system, allowing them to read all or some of the contents of those files. Such sensitive information as hashed credenti
nvd
CVE-2021-34202HIGHCVSS 7.8v1.01b042021-06-16
CVE-2021-34202 [HIGH] CWE-787 CVE-2021-34202: There are multiple out-of-bounds vulnerabilities in some processes of D-Link AC2600(DIR-2640) 1.01B0
There are multiple out-of-bounds vulnerabilities in some processes of D-Link AC2600(DIR-2640) 1.01B04. Ordinary permissions can be elevated to administrator permissions, resulting in local arbitrary code execution. An attacker can combine other vulnerabilities to further achieve the purpose of remote code execution.
nvd
CVE-2021-34201HIGHCVSS 7.1v1.01b042021-06-16
CVE-2021-34201 [HIGH] CWE-787 CVE-2021-34201: D-Link DIR-2640-US 1.01B04 is vulnerable to Buffer Overflow. There are multiple out-of-bounds vulner
D-Link DIR-2640-US 1.01B04 is vulnerable to Buffer Overflow. There are multiple out-of-bounds vulnerabilities in some processes of D-Link AC2600(DIR-2640). Local ordinary users can overwrite the global variables in the .bss section, causing the process crashes or changes.
nvd
CVE-2021-34203HIGHCVSS 8.1v1.01b042021-06-16
CVE-2021-34203 [HIGH] CWE-1188 CVE-2021-34203: D-Link DIR-2640-US 1.01B04 is vulnerable to Incorrect Access Control. Router ac2600 (dir-2640-us), w
D-Link DIR-2640-US 1.01B04 is vulnerable to Incorrect Access Control. Router ac2600 (dir-2640-us), when setting PPPoE, will start quagga process in the way of whole network monitoring, and this function uses the original default password and port. An attacker can easily use telnet to log in, modify routing information, monitor the traffic of all devi
nvd
CVE-2021-34204MEDIUMCVSS 6.8v1.01b042021-06-16
CVE-2021-34204 [MEDIUM] CWE-522 CVE-2021-34204: D-Link DIR-2640-US 1.01B04 is affected by Insufficiently Protected Credentials. D-Link AC2600(DIR-26
D-Link DIR-2640-US 1.01B04 is affected by Insufficiently Protected Credentials. D-Link AC2600(DIR-2640) stores the device system account password in plain text. It does not use linux user management. In addition, the passwords of all devices are the same, and they cannot be modified by normal users. An attacker can easily log in to the target router
nvd