mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
281 lines
12 KiB
JSON
281 lines
12 KiB
JSON
{
|
|
"data_version": "4.0",
|
|
"data_type": "CVE",
|
|
"data_format": "MITRE",
|
|
"CVE_data_meta": {
|
|
"ID": "CVE-2024-6044",
|
|
"ASSIGNER": "cve@cert.org.tw",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Certain models of D-Link wireless routers have a path traversal vulnerability. Unauthenticated attackers on the same local area network can read arbitrary system files by manipulating the URL."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')",
|
|
"cweId": "CWE-22"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"vendor_name": "D-Link",
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "G403",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "<",
|
|
"version_name": "earlier",
|
|
"version_value": "1.10.01"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "G415",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "<",
|
|
"version_name": "earlier",
|
|
"version_value": "1.10.01"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "G416",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "<",
|
|
"version_name": "earlier",
|
|
"version_value": "1.10.01"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "M18",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "<",
|
|
"version_name": "earlier",
|
|
"version_value": "1.10.01"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "R03",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "<",
|
|
"version_name": "earlier",
|
|
"version_value": "1.10.01"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "R04",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "<",
|
|
"version_name": "earlier",
|
|
"version_value": "1.10.01"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "R12",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "<",
|
|
"version_name": "earlier",
|
|
"version_value": "1.10.01"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "R18",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "<",
|
|
"version_name": "earlier",
|
|
"version_value": "1.10.01"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "E30",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "<",
|
|
"version_name": "earlier",
|
|
"version_value": "1.10.02"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "M30",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "<",
|
|
"version_name": "earlier",
|
|
"version_value": "1.10.02"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "M32",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "<",
|
|
"version_name": "earlier",
|
|
"version_value": "1.10.02"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "M60",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "<",
|
|
"version_name": "earlier",
|
|
"version_value": "1.10.02"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "R32",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "<",
|
|
"version_name": "earlier",
|
|
"version_value": "1.10.02"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "E15",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "<",
|
|
"version_name": "earlier",
|
|
"version_value": "1.20.01"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "R15",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "<",
|
|
"version_name": "earlier",
|
|
"version_value": "1.20.01"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"url": "https://www.twcert.org.tw/tw/cp-132-7877-b4674-1.html",
|
|
"refsource": "MISC",
|
|
"name": "https://www.twcert.org.tw/tw/cp-132-7877-b4674-1.html"
|
|
},
|
|
{
|
|
"url": "https://www.twcert.org.tw/en/cp-139-7878-7c3d9-2.html",
|
|
"refsource": "MISC",
|
|
"name": "https://www.twcert.org.tw/en/cp-139-7878-7c3d9-2.html"
|
|
},
|
|
{
|
|
"url": "https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10398",
|
|
"refsource": "MISC",
|
|
"name": "https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10398"
|
|
}
|
|
]
|
|
},
|
|
"generator": {
|
|
"engine": "Vulnogram 0.2.0"
|
|
},
|
|
"source": {
|
|
"advisory": "TVN-202406012",
|
|
"discovery": "EXTERNAL"
|
|
},
|
|
"solution": [
|
|
{
|
|
"lang": "en",
|
|
"supportingMedia": [
|
|
{
|
|
"base64": false,
|
|
"type": "text/html",
|
|
"value": "Please update firmware of following models to 1.10.01 or later version\uff1a<br>G403, G415, G416, M18, R03, R04, R12, R18<br><br>Please update firmware of following models to 1.10.02 or later version\uff1a<br>E30, M30, M32, M60, R32<br><br>Please update firmware of following models to 1.20.01 or later version\uff1a<br>E15, R15<br>"
|
|
}
|
|
],
|
|
"value": "Please update firmware of following models to 1.10.01 or later version\uff1a\nG403, G415, G416, M18, R03, R04, R12, R18\n\nPlease update firmware of following models to 1.10.02 or later version\uff1a\nE30, M30, M32, M60, R32\n\nPlease update firmware of following models to 1.20.01 or later version\uff1a\nE15, R15"
|
|
}
|
|
],
|
|
"impact": {
|
|
"cvss": [
|
|
{
|
|
"attackComplexity": "LOW",
|
|
"attackVector": "ADJACENT_NETWORK",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 6.5,
|
|
"baseSeverity": "MEDIUM",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "NONE",
|
|
"privilegesRequired": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"userInteraction": "NONE",
|
|
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
|
"version": "3.1"
|
|
}
|
|
]
|
|
}
|
|
} |