First published: Tue Aug 23 2022(Updated: )
The WAN configuration page "wan.htm" on D-Link DIR-615 devices with firmware 20.06 can be accessed directly without authentication which can lead to disclose the information about WAN settings and also leverage attacker to modify the data fields of page.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
D-Link DIR-615 | =20.06 | |
D-Link DIR-615 | ||
D-Link DIR-615 | =20.06 | |
D-Link DIR-615 | ||
D-Link DIR-615 | =20.06 | |
D-Link DIR-615 | ||
D-Link DIR-615 Firmware | =20.06 | |
D-Link DIR-615 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-42627 has been classified as a critical vulnerability due to the direct access it allows to the WAN configuration page without authentication.
To mitigate CVE-2021-42627, update the firmware of the D-Link DIR-615 to the latest version provided by D-Link.
CVE-2021-42627 specifically affects D-Link DIR-615 devices running firmware version 20.06.
CVE-2021-42627 can disclose sensitive WAN settings that could be exploited by an attacker.
Yes, an attacker can potentially modify the data fields of the WAN configuration page due to the lack of authentication in CVE-2021-42627.