The D-Link router DIR-880L 1.07 is vulnerable to credentials disclosure in telnet service through decompilation of firmware, that allows an unauthenticated attacker to gain access to the firmware and to extract sensitive data.
References
Link | Resource |
---|---|
https://cybersecurityworks.com/zerodays/cve-2020-29322-telnet-hardcoded-credentials.html | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
12 Jul 2022, 17:42
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-798 |
10 Jun 2021, 19:01
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 5.0
v3 : 7.5 |
CPE | cpe:2.3:h:dlink:dir-880l:-:*:*:*:*:*:*:* cpe:2.3:o:dlink:dir-880l_firmware:1.07:*:*:*:*:*:*:* |
|
References | (MISC) https://cybersecurityworks.com/zerodays/cve-2020-29322-telnet-hardcoded-credentials.html - Exploit, Third Party Advisory | |
CWE | CWE-522 |
04 Jun 2021, 20:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2021-06-04 20:15
Updated : 2024-02-04 21:47
NVD link : CVE-2020-29322
Mitre link : CVE-2020-29322
CVE.ORG link : CVE-2020-29322
JSON object : View
Products Affected
dlink
- dir-880l
- dir-880l_firmware