D-Link DIR-605 Router Information Disclosure Vulnerability (CVE-2021-40655)
D-Link DIR-605 routers contain an information disclosure vulnerability that allows attackers to obtain a username and password by forging a post request to the /getcfg.php page.
A remote attacker, without authentication, can achieve full data confidentiality loss. Federal agencies are required to remediate by 2024-06-06 under CISA BOD 22-01.
This is a Incorrect Authorization (CWE-863) vulnerability in D-Link DIR-605 Router. An informtion disclosure issue exists in D-LINK-DIR-605 B2 Firmware Version : 2.01MT. An attacker can obtain a user name and password by forging a post request to the / getcfg.php page Exploitation requires remote network access, low attack complexity, no authentication required, and no user interaction required.
📧
Phishing link
🖼
Malicious file
🔓
Server compromised
Probably yes if any of these apply:
Active exploitation documented in the wild. Threat-research write-up: https://github.com/Ilovewomen/D-LINK-DIR-605/
Manual remediation steps
No tested PowerShell script for this entry yet. We’re prioritising automation based on user demand.