First published: Mon May 17 2021(Updated: )
An authentication brute-force protection mechanism bypass in telnetd in D-Link Router model DIR-842 firmware version 3.0.2 allows a remote attacker to circumvent the anti-brute-force cool-down delay period via a timing-based side-channel attack
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
TP-Link WR842ND | <=3.0.2 | |
Dlink DIR-842E Firmware | =r1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-27342 has a medium severity rating due to its potential for remote exploitation.
To mitigate CVE-2021-27342, update the D-Link DIR-842 firmware to version 3.0.3 or later.
CVE-2021-27342 allows a remote attacker to bypass authentication brute-force protection mechanisms on affected D-Link routers.
CVE-2021-27342 specifically affects the D-Link DIR-842 with firmware version up to 3.0.2.
Yes, CVE-2021-27342 can be exploited remotely without needing physical access to the D-Link router.