{"id":7750,"date":"2021-08-18T19:43:45","date_gmt":"2021-08-19T02:43:45","guid":{"rendered":"https:\/\/webdev.securin.xyz\/?post_type=zerodays&p=7750"},"modified":"2023-02-06T11:08:29","modified_gmt":"2023-02-06T18:08:29","slug":"cve-2020-29321-telnet-hardcoded-credentials","status":"publish","type":"zerodays","link":"https:\/\/webdev.securin.xyz\/zerodays\/cve-2020-29321-telnet-hardcoded-credentials\/","title":{"rendered":"CVE-2020-29321 – D-Link Router DIR-868LTelnet Hardcoded Credentials"},"content":{"rendered":"

The D-Link router DIR-868L 3.01 is vulnerable to credentials disclosure in telnet service through decompilation of firmware, that allows an unauthenticated attacker to gain access to the firmware and to extract sensitive data.<\/p>\n","protected":false},"featured_media":7742,"parent":0,"menu_order":0,"template":"","vulnerability_categories":[],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/webdev.securin.xyz\/wp-json\/wp\/v2\/zerodays\/7750"}],"collection":[{"href":"https:\/\/webdev.securin.xyz\/wp-json\/wp\/v2\/zerodays"}],"about":[{"href":"https:\/\/webdev.securin.xyz\/wp-json\/wp\/v2\/types\/zerodays"}],"version-history":[{"count":6,"href":"https:\/\/webdev.securin.xyz\/wp-json\/wp\/v2\/zerodays\/7750\/revisions"}],"predecessor-version":[{"id":13666,"href":"https:\/\/webdev.securin.xyz\/wp-json\/wp\/v2\/zerodays\/7750\/revisions\/13666"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/webdev.securin.xyz\/wp-json\/wp\/v2\/media\/7742"}],"wp:attachment":[{"href":"https:\/\/webdev.securin.xyz\/wp-json\/wp\/v2\/media?parent=7750"}],"wp:term":[{"taxonomy":"vulnerability_categories","embeddable":true,"href":"https:\/\/webdev.securin.xyz\/wp-json\/wp\/v2\/vulnerability_categories?post=7750"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}