CVE-2024-45698

Certain models of D-Link wireless routers do not properly validate user input in the telnet service, allowing unauthenticated remote attackers to use hard-coded credentials to log into telnet and inject arbitrary OS commands, which can then be executed on the device.
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:o:dlink:dir-x4860_firmware:1.00:*:*:*:*:*:*:*
cpe:2.3:o:dlink:dir-x4860_firmware:1.04:*:*:*:*:*:*:*
cpe:2.3:h:dlink:dir-x4860:a1:*:*:*:*:*:*:*

History

No history.

Information

Published : 2024-09-16 07:15

Updated : 2024-10-15 10:15


NVD link : CVE-2024-45698

Mitre link : CVE-2024-45698

CVE.ORG link : CVE-2024-45698


JSON object : View

Products Affected

dlink

  • dir-x4860_firmware
  • dir-x4860
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

CWE-798

Use of Hard-coded Credentials