The D-Link router DIR-868L 3.01 is vulnerable to credentials disclosure in telnet service through decompilation of firmware, that allows an unauthenticated attacker to gain access to the firmware and to extract sensitive data.
References
Link | Resource |
---|---|
https://cybersecurityworks.com/zerodays/cve-2020-29321-telnet-hardcoded-credentials.html | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
12 Jul 2022, 17:42
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-798 |
10 Jun 2021, 19:00
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-522 | |
CVSS |
v2 : v3 : |
v2 : 5.0
v3 : 7.5 |
CPE | cpe:2.3:o:dlink:dir-868l_firmware:3.01:*:*:*:*:*:*:* cpe:2.3:h:dlink:dir-868l:-:*:*:*:*:*:*:* |
|
References | (MISC) https://cybersecurityworks.com/zerodays/cve-2020-29321-telnet-hardcoded-credentials.html - Exploit, Third Party Advisory |
04 Jun 2021, 20:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2021-06-04 20:15
Updated : 2024-02-04 21:47
NVD link : CVE-2020-29321
Mitre link : CVE-2020-29321
CVE.ORG link : CVE-2020-29321
JSON object : View
Products Affected
dlink
- dir-868l_firmware
- dir-868l