Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2018-5708
Modified
More InfoOfficial Page
Source-cve@mitre.org
View Known Exploited Vulnerability (KEV) details
Published At-30 Mar, 2018 | 21:29
Updated At-03 Oct, 2019 | 00:03

An issue was discovered on D-Link DIR-601 B1 2.02NA devices. Being on the same local network as, but being unauthenticated to, the administrator's panel, a user can obtain the admin username and cleartext password in the response (specifically, the configuration file restore_default), which is displayed in XML.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.08.0HIGH
CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Primary2.06.1MEDIUM
AV:A/AC:L/Au:N/C:C/I:N/A:N
CPE Matches

D-Link Corporation
dlink
>>dir-601_firmware>>2.02na
cpe:2.3:o:dlink:dir-601_firmware:2.02na:*:*:*:*:*:*:*
D-Link Corporation
dlink
>>dir-601>>-
cpe:2.3:h:dlink:dir-601:-:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-522Primarynvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://seclists.org/fulldisclosure/2018/Mar/66cve@mitre.org
Mailing List
Third Party Advisory
https://securityadvisories.dlink.com/announcement/publication.aspx?name=SAP10111cve@mitre.org
N/A
https://www.exploit-db.com/exploits/44388/cve@mitre.org
Third Party Advisory
VDB Entry
Change History
0Changes found

Details not found