Unauthorized Configuration Modification in D-Link Router by D-Link
CVE-2021-3707
5.5MEDIUM
Key Information:
Badges
👾 Exploit Exists🟡 Public PoC
Summary
The D-Link DSL-2750U router is susceptible to a vulnerability that enables unauthorized modification of device configuration settings. An attacker on the same local network can exploit this flaw to perform unauthorized changes. If exploited in conjunction with another vulnerability, it may lead to the execution of arbitrary operating system commands on the device, posing significant risks to the network's integrity and security.
Affected Version(s)
DSL-2750U firmware vME1.16 or prior versions
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V3.1
Score:
5.5
Severity:
MEDIUM
Confidentiality:
None
Integrity:
High
Availability:
None
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
- 🟡
Public PoC available
- 👾
Exploit known to exist