CVE-2020-29321

The D-Link router DIR-868L 3.01 is vulnerable to credentials disclosure in telnet service through decompilation of firmware, that allows an unauthenticated attacker to gain access to the firmware and to extract sensitive data.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:dlink:dir-868l_firmware:3.01:*:*:*:*:*:*:*
cpe:2.3:h:dlink:dir-868l:-:*:*:*:*:*:*:*

History

12 Jul 2022, 17:42

Type Values Removed Values Added
CWE CWE-798

10 Jun 2021, 19:00

Type Values Removed Values Added
CWE CWE-522
CVSS v2 : unknown
v3 : unknown
v2 : 5.0
v3 : 7.5
CPE cpe:2.3:o:dlink:dir-868l_firmware:3.01:*:*:*:*:*:*:*
cpe:2.3:h:dlink:dir-868l:-:*:*:*:*:*:*:*
References (MISC) https://cybersecurityworks.com/zerodays/cve-2020-29321-telnet-hardcoded-credentials.html - (MISC) https://cybersecurityworks.com/zerodays/cve-2020-29321-telnet-hardcoded-credentials.html - Exploit, Third Party Advisory

04 Jun 2021, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2021-06-04 20:15

Updated : 2024-02-04 21:47


NVD link : CVE-2020-29321

Mitre link : CVE-2020-29321

CVE.ORG link : CVE-2020-29321


JSON object : View

Products Affected

dlink

  • dir-868l_firmware
  • dir-868l
CWE
CWE-522

Insufficiently Protected Credentials

CWE-798

Use of Hard-coded Credentials