D-Link DIR-620 devices, with a certain Rostelekom variant...
Critical severity
Unreviewed
Published
May 13, 2022
to the GitHub Advisory Database
•
Updated Feb 1, 2023
Description
Published by the National Vulnerability Database
Jun 19, 2018
Published to the GitHub Advisory Database
May 13, 2022
Last updated
Feb 1, 2023
D-Link DIR-620 devices, with a certain Rostelekom variant of firmware 1.0.37, have a hardcoded rostel account, which makes it easier for remote attackers to obtain access via a TELNET session.
References