First published: Mon Sep 16 2024(Updated: )
Certain models of D-Link wireless routers do not properly validate user input in the telnet service, allowing unauthenticated remote attackers to use hard-coded credentials to log into telnet and inject arbitrary OS commands, which can then be executed on the device.
Credit: twcert@cert.org.tw
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Any of | ||
Dlink Dir-x4860 Firmware | =1.00 | |
Dlink Dir-x4860 Firmware | =1.04 | |
Dlink Dir-x4860 | =a1 |
Update firmware of DIR-X4860 A1 to version 1.04B05 or later.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.