Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 06 May 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Dlink
Dlink m60 Dlink m60 Firmware |
|
| CPEs | cpe:2.3:h:dlink:m60:-:*:*:*:*:*:*:* cpe:2.3:o:dlink:m60_firmware:1.20b02:*:*:*:*:*:*:* |
|
| Vendors & Products |
Dlink
Dlink m60 Dlink m60 Firmware |
Mon, 04 May 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 01 May 2026 08:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
D-link
D-link m60 |
|
| Vendors & Products |
D-link
D-link m60 |
Fri, 01 May 2026 06:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was determined in D-Link M60 up to 1.20B02. Affected by this issue is some unknown functionality of the file /usr/bin/httpd. This manipulation causes weak password recovery. The attack can be initiated remotely. A high degree of complexity is needed for the attack. The exploitation is known to be difficult. The exploit has been publicly disclosed and may be utilized. | |
| Title | D-Link M60 httpd password recovery | |
| Weaknesses | CWE-640 | |
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-05-04T16:50:08.741Z
Reserved: 2026-04-30T19:07:48.377Z
Link: CVE-2026-7554
Updated: 2026-05-04T16:50:02.852Z
Status : Analyzed
Published: 2026-05-01T06:16:32.420
Modified: 2026-05-06T18:10:51.343
Link: CVE-2026-7554
No data.
OpenCVE Enrichment
Updated: 2026-05-02T00:00:14Z