CVE-2009-4821

N/A Unknown
Published: April 27, 2010 Modified: April 29, 2026
View on NVD

Description

The D-Link DIR-615 with firmware 3.10NA does not require administrative authentication for apply.cgi, which allows remote attackers to (1) change the admin password via the admin_password parameter, (2) disable the security requirement for the Wi-Fi network via unspecified vectors, or (3) modify DNS settings via unspecified vectors.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://secunia.com/advisories/37777
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/37777
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.hiredhacker.com/2009/12/15/d-link-dir-615-remote-exploit/
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit
http://www.securityfocus.com/bid/37415
Source: af854a3a-2127-422b-91ae-364da2661108

6 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
0.2%
41th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

dlink