First published: Mon Jun 17 2024(Updated: )
Certain models of D-Link wireless routers contain an undisclosed factory testing backdoor. Unauthenticated attackers on the local area network can force the device to enable Telnet service by accessing a specific URL and can log in by using the administrator credentials obtained from analyzing the firmware.
Credit: twcert@cert.org.tw
Affected Software | Affected Version | How to fix |
---|---|---|
D-Link DIR-823X AX3000 Dual-Band Gigabit Wireless Router |
Please update firmware of following models to 1.10.01 or later version: G403, G415, G416, M18, R03, R04, R12, R18 Please update firmware of following models to 1.10.02 or later version: E30, M30, M32, M60, R32 Please update firmware of following models to 1.20.01 or later version: E15, R15
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-6045 is considered a high severity vulnerability due to the potential for unauthorized access to the device.
To mitigate CVE-2024-6045, ensure that the firmware of the affected D-Link wireless router is updated to the latest version provided by D-Link.
CVE-2024-6045 affects specific models of D-Link wireless routers, such as the DIR-823X AX3000 Dual-Band Gigabit Wireless Router.
CVE-2024-6045 requires the attacker to be on the local area network to exploit the vulnerability.
The implications of CVE-2024-6045 include unauthorized access to the router's admin interface, potentially allowing attackers to compromise network security.