CVE-2021-42627
Summary
| CVE | CVE-2021-42627 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2022-08-23 12:15:00 UTC |
| Updated | 2023-04-26 18:55:00 UTC |
| Description | The WAN configuration page "wan.htm" on D-Link DIR-615 devices with firmware 20.06 can be accessed directly without authentication which can lead to disclose the information about WAN settings and also leverage attacker to modify the data fields of page. |
Risk And Classification
Problem Types: NVD-CWE-Other
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Hardware | D-link | Dir-615 | - | All | All | All |
| Hardware | Dlink | Dir-615 | - | All | All | All |
| Hardware | Dlink | Dir-615jx10 | - | All | All | All |
| Operating System | Dlink | Dir-615jx10 Firmware | 20.06 | All | All | All |
| Operating System | Dlink | Dir-615 Firmware | 20.06 | All | All | All |
| Hardware | Dlink | Dir-615 J1 | - | All | All | All |
| Operating System | Dlink | Dir-615 J1 Firmware | 20.06 | All | All | All |
| Hardware | Dlink | Dir-615 T1 | - | All | All | All |
| Operating System | Dlink | Dir-615 T1 Firmware | 20.06 | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Security Bulletin | D-Link | MISC | www.dlink.com | |
| d-link.com | MISC | d-link.com | |
| Consumer | D-Link | MISC | dlink.com | |
| D-Link-DIR-615/CVE-2021-42627 at main · sanjokkarki/D-Link-DIR-615 · GitHub | MISC | github.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.