Summary
This host is running D-Link DIR-645 Router and is prone to authentication bypass vulnerability.
Impact
Successful exploitation will allow attacker to retrieve the administrator password and then access the device with full privileges. This will allow an attacker to launch further attacks.
Impact Level: Application
Solution
Upgrade to D-Link DIR-645 firmware version 1.03 or later, For updates refer to http://www.dlink.com/ca/en/home-solutions/connect/routers/dir-645-wireless-n-home-router-1000
Insight
The web interface of D-Link DIR-645 routers expose several pages accessible with no authentication. These pages can be abused to access sensitive information concerning the device configuration, including the clear-text password for the administrative user.
Affected
D-Link DIR-645 firmware version prior to 1.03
References
Updated on 2015-03-25
Severity
Classification
-
CVSS Base Score: 5.0
AV:N/AC:L/Au:N/C:P/I:N/A:N
Related Vulnerabilities
- Apache Struts Directory Traversal Vulnerability
- Annuaire PHP 'sites_inscription.php' Cross Site Scripting Vulnerability
- Abtp Portal Project 'ABTPV_BLOQUE_CENT' Parameter Local and Remote File Include Vulnerabilities
- APC PowerChute Network Shutdown 'security/applet' Cross Site Scripting Vulnerability
- Apache Tiles Multiple XSS Vulnerability