Vulnerability Details : CVE-2021-34204
Potential exploit
D-Link DIR-2640-US 1.01B04 is affected by Insufficiently Protected Credentials. D-Link AC2600(DIR-2640) stores the device system account password in plain text. It does not use linux user management. In addition, the passwords of all devices are the same, and they cannot be modified by normal users. An attacker can easily log in to the target router through the serial port and obtain root privileges.
Products affected by CVE-2021-34204
- cpe:2.3:o:dlink:dir-2640-us_firmware:1.01b04:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2021-34204
0.06%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 16 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2021-34204
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.2
|
HIGH | AV:L/AC:L/Au:N/C:C/I:C/A:C |
3.9
|
10.0
|
NIST | |
6.8
|
MEDIUM | CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
0.9
|
5.9
|
NIST |
CWE ids for CVE-2021-34204
-
The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval.Assigned by: nvd@nist.gov (Primary)
References for CVE-2021-34204
-
https://github.com/liyansong2018/CVE/tree/main/2021/CVE-2021-34204
CVE/2021/CVE-2021-34204 at main · liyansong2018/CVE · GitHubExploit;Third Party Advisory
-
http://dir-2640-us.com
Broken Link
-
https://www.dlink.com/en/security-bulletin/
Security Bulletin | D-LinkVendor Advisory
-
http://d-link.com
Broken Link
Jump to