| عنوان | dlink DCS-7517B1 below or equal v2.02.01 hardcode weak password |
|---|
| الوصف | In D-linkDCS-7517B1 firmware, binary /bin/httpd contains a hardcoded weak password vulnerability. When the device detects that the provider is "Qlync", a hardcoded root-level user account is created using a static password hashed from a known string.
This behavior allows an attacker to gain full administrative access using a fixed, publicly reversible password. |
|---|
| المصدر | ⚠️ http://cdn2.v50to.cc/dlink/DCS-7517_B1_FW_v2.02.01/report_2.pdf |
|---|
| المستخدم | CookedMelon (UID 52513) |
|---|
| ارسال | 27/06/2025 06:58 PM (10 أشهر منذ) |
|---|
| الاعتدال | 30/06/2025 05:59 PM (3 days later) |
|---|
| الحالة | تمت الموافقة |
|---|
| إدخال VulDB | 314445 [D-Link DCS-7517 حتى 2.02.0 Qlync Password Generation /bin/httpd g_F_n_GenPassForQlync توثيق ضعيف] |
|---|
| النقاط | 18 |
|---|