cve/2021/CVE-2021-20132.md

18 lines
850 B
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2021-20132](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20132)
![](https://img.shields.io/static/v1?label=Product&message=Quagga%20Services%20on%20D-Link%20DIR-2640%20Routers&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Use%20of%20Hard-coded%20Credentials&color=brighgreen)
### Description
Quagga Services on D-Link DIR-2640 less than or equal to version 1.11B02 use default hard-coded credentials, which can allow a remote attacker to gain administrative access to the zebra or ripd those services. Both are running with root privileges on the router (i.e., as the "admin" user, UID 0).
### POC
#### Reference
- https://www.tenable.com/security/research/tra-2021-44
#### Github
No PoCs found on GitHub currently.