D-Link DIR-2640-US 1.01B04 is vulnerable to Incorrect Access Control. Router ac2600 (dir-2640-us), when setting PPPoE, will start quagga process in the way of whole network monitoring, and this function uses the original default password and port. An attacker can easily use telnet to log in, modify routing information, monitor the traffic of all devices under the router, hijack DNS and phishing attacks. In addition, this interface is likely to be questioned by customers as a backdoor, because the interface should not be exposed.
References
Link Resource
http://d-link.com Vendor Advisory
http://dir-2640-us.com Broken Link URL Repurposed
https://github.com/liyansong2018/CVE/tree/main/2021/CVE-2021-34203 Exploit Third Party Advisory
https://www.dlink.com/en/security-bulletin/ Vendor Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: mitre

Published: 2021-06-16T19:02:03

Updated: 2021-06-16T19:02:03

Reserved: 2021-06-07T00:00:00


Link: CVE-2021-34203

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2021-06-16T20:15:07.610

Modified: 2024-02-14T01:17:43.863


Link: CVE-2021-34203

JSON object: View

cve-icon Redhat Information

No data.

CWE