First published: Fri May 18 2018(Updated: )
On D-Link DIR-550A and DIR-604M devices through v2.10KR, a malicious user can use a default TELNET account to get unauthorized access to vulnerable devices, aka a backdoor access vulnerability.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
D-link Dir-550a Firmware | <=2.10kr | |
Dlink Dir-550a | ||
D-link Dir-604m Firmware | <=2.10kr | |
Dlink Dir-604m |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2018-10968 is high due to the potential for unauthorized access to vulnerable devices.
To fix CVE-2018-10968, users should disable the default TELNET account and upgrade to firmware versions beyond v2.10KR.
CVE-2018-10968 affects D-Link DIR-550A and DIR-604M devices with firmware versions up to 2.10KR.
Yes, CVE-2018-10968 allows a malicious user to gain unauthorized remote access to the affected devices.
The exploitation method for CVE-2018-10968 involves using a default TELNET account to access the devices.