First published: Sun Jun 11 2017(Updated: )
D-Link DIR-615 Wireless N 300 Router allows authentication bypass via a modified POST request to login.cgi. This issue occurs because it fails to validate the password field. Successful exploitation of this issue allows an attacker to take control of the affected device.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
D-Link DIR-615GF Firmware | ||
D-Link DIR-615 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-9542 has a high severity rating due to the potential for unauthorized access to the affected device.
To fix CVE-2017-9542, update the firmware of the D-Link DIR-615 router to the latest version provided by D-Link.
Exploitation of CVE-2017-9542 allows an attacker to bypass authentication and take control of the router.
CVE-2017-9542 affects specific firmware versions of the D-Link DIR-615 router, not all models.
You can check if your D-Link DIR-615 device is affected by verifying the firmware version against the known vulnerable versions.