First published: Tue Jul 30 2024(Updated: )
In D-Link DIR-860L REVA FIRMWARE PATCH 1.10..B04, the Telnet service contains hardcoded credentials, enabling attackers to log in remotely to the Telnet service and perform arbitrary commands.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
D-Link DIR-860L firmware | =1.10..B04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-41611 is considered a critical severity vulnerability due to its potential for remote unauthorized access.
To fix CVE-2024-41611, upgrade the D-Link DIR-860L firmware to the latest version provided by D-Link that resolves the hardcoded credentials issue.
CVE-2024-41611 is caused by the presence of hardcoded credentials in the Telnet service of the D-Link DIR-860L firmware version 1.10..B04.
Users of the D-Link DIR-860L router running firmware version 1.10..B04 are affected by CVE-2024-41611.
The potential impacts of CVE-2024-41611 include unauthorized remote access to the device and the ability to execute arbitrary commands.