First published: Mon Feb 23 2015(Updated: )
The D-Link DIR-645 Wired/Wireless Router Rev. Ax with firmware 1.04b12 and earlier allows remote attackers to execute arbitrary commands via a GetDeviceSettings action to the HNAP interface.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
D-Link DIR-645 Firmware | <=1.04b12 | |
dlink DIR-645 A1 | =a1 | |
D-Link DIR-645 | ||
All of | ||
D-Link DIR-645 Firmware | <1.05b01 | |
dlink DIR-645 A1 | =a1 | |
All of | ||
<1.05b01 | ||
=a1 |
The impacted product is end-of-life and should be disconnected if still in use.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-2051 is considered to have a high severity as it allows remote attackers to execute arbitrary commands on the vulnerable D-Link DIR-645 routers.
To fix CVE-2015-2051, update the firmware of the D-Link DIR-645 router to a version later than 1.04b12.
CVE-2015-2051 affects the D-Link DIR-645 router with firmware versions up to and including 1.04b12.
Yes, CVE-2015-2051 can be exploited remotely through the HNAP interface of the D-Link DIR-645 router.
CVE-2015-2051 specifically affects the D-Link DIR-645 Wired/Wireless Router Rev. Ax with the vulnerable firmware versions.