First published: Thu Jun 13 2024(Updated: )
D-Link DIR-605L v2.13B01 was discovered to contain a hardcoded password vulnerability in /etc/passwd, which allows attackers to log in as root.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
D-Link DIR-605L Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-37630 is considered a high severity vulnerability due to the presence of a hardcoded password that allows unauthorized root access.
To fix CVE-2024-37630, it is recommended to update the D-Link DIR-605L firmware to the latest version that addresses this vulnerability.
As of now, there are no confirmed reports of active exploitation for CVE-2024-37630, but it is critical to mitigate the risk.
The potential impacts of CVE-2024-37630 include unauthorized remote access and control over the D-Link DIR-605L device.
To protect your D-Link DIR-605L from CVE-2024-37630, ensure that your device firmware is updated regularly and consider implementing additional network security measures.