First published: Fri May 15 2020(Updated: )
An issue was discovered on D-Link DAP-1360 revision F devices. Remote attackers can start a telnet service without authorization via an undocumented HTTP request. Although this is the primary vulnerability, the impact depends on the firmware version. Versions 609EU through 613EUbeta were tested. Versions through 6.12b01 have weak root credentials, allowing an attacker to gain remote root access. After 6.12b01, the root credentials were changed but the telnet service can still be started without authorization.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
dlink DAP-1360 firmware | <=6.12b01 | |
dlink DAP-1360 revision F firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-18666 has a medium severity rating due to the potential for unauthorized remote access through the telnet service.
To fix CVE-2019-18666, update the D-Link DAP-1360 revision F firmware to a version beyond 6.12b01 that addresses this vulnerability.
CVE-2019-18666 affects users of D-Link DAP-1360 revision F devices running firmware versions 6.12b01 and below.
The impact of CVE-2019-18666 is that remote attackers can enable a telnet service on the device without proper authorization.
As of the latest information, there are no confirmed reports of active exploitation of CVE-2019-18666, but it is advisable to take preventive measures.