Local File Inclusion Vulnerability in D-Link DAP-1620
CVE-2021-46381
7.5HIGH
Summary
The D-Link DAP-1620 is susceptible to a Local File Inclusion vulnerability, which is triggered by improper validation of user input. This flaw allows an attacker to exploit path traversal techniques to access sensitive system files, such as '/etc/passwd' and '/etc/shadow'. When exploited, this vulnerability can lead to unauthorized access to critical system information, potentially compromising user data and system integrity.
References
EPSS Score
93% chance of being exploited in the next 30 days.
CVSS V3.1
Score:
7.5
Severity:
HIGH
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved