| 제목 | dlink DCS-7517B1 below or equal v2.02.01 predictable weak password |
|---|
| 설명 | In D-link DCS-7517B1 firmware, binary /bin/httpd contains weak password vulnerability. The root user, which has superuser privileges (UID=0, GID=0), uses a password generated via a predictable mechanism based on the devices's MAC address. Attackers can reproduce the password generation and gain unauthorized administrative access to the device. |
|---|
| 원천 | ⚠️ http://cdn2.v50to.cc/dlink/DCS-7517_B1_FW_v2.02.01/report_1.pdf |
|---|
| 사용자 | CookedMelon (UID 52513) |
|---|
| 제출 | 2025. 06. 27. PM 06:57 (10 개월 ago) |
|---|
| 모더레이션 | 2025. 06. 30. PM 05:52 (3 days later) |
|---|
| 상태 | 중복 |
|---|
| VulDB 항목 | 314443 [D-Link DCS-6517/DCS-7517 까지 2.02.0 Root Password Generation /bin/httpd generate_pass_from_mac 약한 암호화] |
|---|
| 포인트들 | 0 |
|---|