10

CVE-2018-6213

Exploit

In the web server on D-Link DIR-620 devices with a certain customized (by ISP) variant of firmware 1.0.3, 1.0.37, 1.3.1, 1.3.3, 1.3.7, 1.4.0, and 2.0.22, there is a hardcoded password of anonymous for the admin account.

Data is provided by the National Vulnerability Database (NVD)
D-linkDir-620 Firmware Version1.0.3
   DlinkDir-620 Version-
D-linkDir-620 Firmware Version1.0.37
   DlinkDir-620 Version-
D-linkDir-620 Firmware Version1.3.1
   DlinkDir-620 Version-
D-linkDir-620 Firmware Version1.3.3
   DlinkDir-620 Version-
D-linkDir-620 Firmware Version1.3.7
   DlinkDir-620 Version-
D-linkDir-620 Firmware Version1.4.0
   DlinkDir-620 Version-
D-linkDir-620 Firmware Version2.0.22
   DlinkDir-620 Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 3.1% 0.863
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 9.8 3.9 5.9
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
nvd@nist.gov 10 10 10
AV:N/AC:L/Au:N/C:C/I:C/A:C
CWE-798 Use of Hard-coded Credentials

The product contains hard-coded credentials, such as a password or cryptographic key.