CVE-2024-45698

critical

Description

Certain models of D-Link wireless routers do not properly validate user input in the telnet service, allowing unauthenticated remote attackers to use hard-coded credentials to log into telnet and inject arbitrary OS commands, which can then be executed on the device.

References

https://www.bleepingcomputer.com/news/security/d-link-fixes-critical-rce-hardcoded-password-flaws-in-wifi-6-routers/

https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10412

https://www.twcert.org.tw/tw/cp-132-8090-bf06b-1.html

https://www.twcert.org.tw/en/cp-139-8091-bcd52-2.html

Details

Source: Mitre, NVD

Published: 2024-09-16

Updated: 2024-10-15

Risk Information

CVSS v2

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Severity: Critical

CVSS v3

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Severity: Critical