cvelist/2009/4xxx/CVE-2009-4821.json
2019-03-17 23:32:01 +00:00

72 lines
2.3 KiB
JSON

{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2009-4821",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The D-Link DIR-615 with firmware 3.10NA does not require administrative authentication for apply.cgi, which allows remote attackers to (1) change the admin password via the admin_password parameter, (2) disable the security requirement for the Wi-Fi network via unspecified vectors, or (3) modify DNS settings via unspecified vectors."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "37415",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/37415"
},
{
"name": "37777",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/37777"
},
{
"name": "http://www.hiredhacker.com/2009/12/15/d-link-dir-615-remote-exploit/",
"refsource": "MISC",
"url": "http://www.hiredhacker.com/2009/12/15/d-link-dir-615-remote-exploit/"
}
]
}
}