D-Link.DIR-600M.login.cgi.Password.Authentication.Bypass
Description
This indicates an attack attempt to exploit a Security Bypass vulnerability in D-Link DIR-600M devices.
This issue is caused by insufficient validation of access to the targeted system. It may allow remote attacker to execute arbitrary code without authentication via a crafted http request.
Affected Products
D-Link DIR-600M devices with firmware 3.04
Impact
System Compromise: Remote attackers can gain control of vulnerable systems.
Recommended Actions
Currently we are unaware of any patches supplied by the vendor for this issue.
Coverage
| IPS (Regular DB) | |
| IPS (Extended DB) |
Version Updates
| Date | Version | Status | Detail |
|---|---|---|---|
| 2024-06-05 | 28.801 |
Modified
|
Name:D-Link. Wireless. Router. Authentication. Bypass:D-Link. DIR-600M. login. cgi. Password. Authentication. Bypass |