First published: Wed Sep 13 2017(Updated: )
D-Link DIR-850L REV. B (with firmware through FW208WWb02) devices have a hardcoded password of wrgac25_dlink.2013gui_dir850l for the Alphanetworks account upon device reset, which allows remote attackers to obtain root access via a TELNET session.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
D-Link DIR-850L firmware | <=fw208wwb02 | |
D-Link DIR-850L Firmware | ||
dlink DIR-850L firmware | <=fw208wwb02 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-14421 is considered a high-severity vulnerability due to its potential for remote root access.
To fix CVE-2017-14421, update your D-Link DIR-850L firmware to a version later than FW208WWb02.
CVE-2017-14421 affects D-Link DIR-850L devices with firmware versions up to and including FW208WWb02.
Yes, CVE-2017-14421 can be exploited remotely via a TELNET session due to the hardcoded password.
If you cannot update the firmware, it's essential to disable remote administration and secure the device as much as possible.