Show plain JSON{"id": "CVE-2024-6045", "metrics": {"cvssMetricV31": [{"type": "Secondary", "source": "twcert@cert.org.tw", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 8.8, "attackVector": "ADJACENT_NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "HIGH"}, "impactScore": 5.9, "exploitabilityScore": 2.8}]}, "published": "2024-06-17T04:15:09.287", "references": [{"url": "https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10398", "source": "twcert@cert.org.tw"}, {"url": "https://www.twcert.org.tw/en/cp-139-7880-629f5-2.html", "source": "twcert@cert.org.tw"}, {"url": "https://www.twcert.org.tw/tw/cp-132-7879-da630-1.html", "source": "twcert@cert.org.tw"}, {"url": "https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10398", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://www.twcert.org.tw/en/cp-139-7880-629f5-2.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://www.twcert.org.tw/tw/cp-132-7879-da630-1.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Awaiting Analysis", "weaknesses": [{"type": "Secondary", "source": "twcert@cert.org.tw", "description": [{"lang": "en", "value": "CWE-798"}, {"lang": "en", "value": "CWE-912"}]}], "descriptions": [{"lang": "en", "value": "Certain models of D-Link wireless routers contain an undisclosed factory testing backdoor. Unauthenticated attackers on the local area network can force the device to enable Telnet service by accessing a specific URL and can log in by using the administrator credentials obtained from analyzing the firmware."}, {"lang": "es", "value": "Ciertos modelos de enrutadores inal\u00e1mbricos D-Link contienen una puerta trasera de prueba de f\u00e1brica no revelada. Los atacantes no autenticados en la red de \u00e1rea local pueden obligar al dispositivo a habilitar el servicio Telnet accediendo a una URL espec\u00edfica y pueden iniciar sesi\u00f3n utilizando las credenciales de administrador obtenidas al analizar el firmware."}], "lastModified": "2024-11-21T09:48:50.090", "sourceIdentifier": "twcert@cert.org.tw"}