Description
On D-Link DIR-550A and DIR-604M devices through v2.10KR, a malicious user can use a default TELNET account to get unauthorized access to vulnerable devices, aka a backdoor access vulnerability.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2018-3019 | On D-Link DIR-550A and DIR-604M devices through v2.10KR, a malicious user can use a default TELNET account to get unauthorized access to vulnerable devices, aka a backdoor access vulnerability. |
References
| Link | Providers |
|---|---|
| https://fortiguard.com/zeroday/FG-VD-18-061 |
|
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T07:54:36.070Z
Reserved: 2018-05-10T00:00:00.000Z
Link: CVE-2018-10968
No data.
Status : Modified
Published: 2018-05-18T14:29:00.267
Modified: 2024-11-21T03:42:24.810
Link: CVE-2018-10968
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD