CVE-2017-9542

D-Link DIR-615 Wireless N 300 Router allows authentication bypass via a modified POST request to login.cgi. This issue occurs because it fails to validate the password field. Successful exploitation of this issue allows an attacker to take control of the affected device.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:d-link:dir-615_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:dlink:dir-615:-:*:*:*:*:*:*:*

History

21 Nov 2024, 03:36

Type Values Removed Values Added
References () http://www.securityfocus.com/bid/98992 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/98992 - Third Party Advisory, VDB Entry
References () https://twitter.com/tiger_tigerboy/status/873458088321220609 - Third Party Advisory () https://twitter.com/tiger_tigerboy/status/873458088321220609 - Third Party Advisory
References () https://www.facebook.com/tigerBOY777/videos/1368513696568992/ - Permissions Required () https://www.facebook.com/tigerBOY777/videos/1368513696568992/ - Permissions Required

26 Apr 2023, 18:55

Type Values Removed Values Added
First Time Dlink
Dlink dir-615
CPE cpe:2.3:h:d-link:dir-615:-:*:*:*:*:*:*:* cpe:2.3:h:dlink:dir-615:-:*:*:*:*:*:*:*

Information

Published : 2017-06-11 23:29

Updated : 2025-04-20 01:37


NVD link : CVE-2017-9542

Mitre link : CVE-2017-9542

CVE.ORG link : CVE-2017-9542


JSON object : View

Products Affected

d-link

  • dir-615_firmware

dlink

  • dir-615
CWE
CWE-287

Improper Authentication