D-Link Releases Patch For Hard-coded Password Vulnerabilities

Share post:

D-Link recently released a firmware hotfix for all affected customers on July 15, after fixing the bugs in the DIR-3040 AC3000 wireless internet router.

Vulnerabilities discovered and reported by Cisco Talos security researcher Dave McDaniel could allow an attacker to execute arbitrary code on unpatched routers and gain access to sensitive information upon successful exploitation.

The Zebra IP Routing Manager of the router and the Libcli Environment functionality contains the vulnerabilities CVE-2021-21818 and CVE-2021-2180, which contain hard encrypted passwords and credentials.

Both of these could allow threat actors targeting D-Link DIR-3040 routers to bypass the authentication rules which are configured by the software administrator.

The five vulnerabilities that D-Link is fixing with the hotfix are CVE-2021-21816, CVE-2021-21817, CVE-2021-21818, CVE-2021-21819, and CVE-2021-21820.

For more information, read the original story in Bleeping Computer.

SUBSCRIBE NOW

Related articles

Hashtag Trending for World Password Day, Thursday, May 2nd, 2024

Security firm Okta warns of an unprecendented password stuffing attack that is piggybacking on regular user’s mobile and...

Google Chrome’s new post-quantum cryptography causes connection issues

The latest update to Google Chrome, version 124, which integrates a new quantum-resistant encryption mechanism, has led to...

UK legislation bans weak passwords

Starting Monday, the UK will enforce new laws banning the sale of devices with weak default passwords such...

Massive Credential Stuffing attack exploits home devices

Okta, a leading authentication service, is raising alarms over a massive credential-stuffing attack that cleverly disguises fraudulent login...

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways