First published: Tue Apr 27 2010(Updated: )
The D-Link DIR-615 with firmware 3.10NA does not require administrative authentication for apply.cgi, which allows remote attackers to (1) change the admin password via the admin_password parameter, (2) disable the security requirement for the Wi-Fi network via unspecified vectors, or (3) modify DNS settings via unspecified vectors.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
D-Link DIR-615 | =3.10na |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-4821 has a medium severity rating due to its potential for unauthorized remote access to sensitive router settings.
To fix CVE-2009-4821, update the firmware of your D-Link DIR-615 to a version that addresses this vulnerability.
Exploiting CVE-2009-4821 can lead to unauthorized changes to the admin password, disabling of Wi-Fi security, and modification of DNS settings.
CVE-2009-4821 specifically affects D-Link DIR-615 routers running firmware version 3.10NA.
Yes, CVE-2009-4821 can be exploited remotely since it does not require administrative authentication to access the affected functions.