Enviar #605593: dlink DCS-7517B1 below or equal v2.02.01 predictable weak passwordinformación

Títulodlink DCS-7517B1 below or equal v2.02.01 predictable weak password
DescripciónIn D-link DCS-7517B1 firmware, binary /bin/httpd contains weak password vulnerability. The root user, which has superuser privileges (UID=0, GID=0), uses a password generated via a predictable mechanism based on the devices's MAC address. Attackers can reproduce the password generation and gain unauthorized administrative access to the device.
Fuente⚠️ http://cdn2.v50to.cc/dlink/DCS-7517_B1_FW_v2.02.01/report_1.pdf
Usuario
 CookedMelon (UID 52513)
Sumisión2025-06-27 18:57 (hace 10 meses)
Moderación2025-06-30 17:52 (3 days later)
EstadoDuplicado
Entrada de VulDB314443 [D-Link DCS-6517/DCS-7517 hasta 2.02.0 Root Password Generation /bin/httpd generate_pass_from_mac cifrado débil]
Puntos0

Do you want to use VulDB in your project?

Use the official API to access entries easily!