René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

131 lines
3.8 KiB
JSON

{
"id": "CVE-2017-9542",
"sourceIdentifier": "cve@mitre.org",
"published": "2017-06-11T23:29:00.167",
"lastModified": "2017-06-22T18:31:44.697",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "D-Link DIR-615 Wireless N 300 Router allows authentication bypass via a modified POST request to login.cgi. This issue occurs because it fails to validate the password field. Successful exploitation of this issue allows an attacker to take control of the affected device."
},
{
"lang": "es",
"value": "El Enrutador DIR-615 Wireless N 300 de D-Link, permite la omisi\u00f3n de autenticaci\u00f3n por medio de una petici\u00f3n POST modificada para el archivo login.cgi. Este problema ocurre porque no puede comprobar el campo password. La explotaci\u00f3n con \u00e9xito de este problema le permite a un atacante tomar el control del dispositivo afectado."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-287"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:d-link:dir-615_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F284D818-EE79-40AF-80B5-77EBE67B4DD7"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:d-link:dir-615:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EC2E92CD-7C88-4CA9-B018-441259AA7519"
}
]
}
]
}
],
"references": [
{
"url": "http://www.securityfocus.com/bid/98992",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://twitter.com/tiger_tigerboy/status/873458088321220609",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.facebook.com/tigerBOY777/videos/1368513696568992/",
"source": "cve@mitre.org",
"tags": [
"Permissions Required"
]
}
]
}