{"id":7755,"date":"2021-08-18T19:47:16","date_gmt":"2021-08-19T02:47:16","guid":{"rendered":"https:\/\/webdev.securin.xyz\/?post_type=zerodays&p=7755"},"modified":"2023-02-06T11:09:11","modified_gmt":"2023-02-06T18:09:11","slug":"cve-2020-29322-telnet-hardcoded-credentials","status":"publish","type":"zerodays","link":"https:\/\/webdev.securin.xyz\/zerodays\/cve-2020-29322-telnet-hardcoded-credentials\/","title":{"rendered":"CVE-2020-29322 – D-Link Router DIR-880L Telnet Hardcoded credentials"},"content":{"rendered":"

The D-Link router DIR-880L 1.07 is vulnerable to credentials disclosure in telnet service through decompilation of firmware, that allows an unauthenticated attacker to gain access to the firmware and to extract sensitive data.<\/p>\n","protected":false},"featured_media":7742,"parent":0,"menu_order":0,"template":"","vulnerability_categories":[],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/webdev.securin.xyz\/wp-json\/wp\/v2\/zerodays\/7755"}],"collection":[{"href":"https:\/\/webdev.securin.xyz\/wp-json\/wp\/v2\/zerodays"}],"about":[{"href":"https:\/\/webdev.securin.xyz\/wp-json\/wp\/v2\/types\/zerodays"}],"version-history":[{"count":6,"href":"https:\/\/webdev.securin.xyz\/wp-json\/wp\/v2\/zerodays\/7755\/revisions"}],"predecessor-version":[{"id":13667,"href":"https:\/\/webdev.securin.xyz\/wp-json\/wp\/v2\/zerodays\/7755\/revisions\/13667"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/webdev.securin.xyz\/wp-json\/wp\/v2\/media\/7742"}],"wp:attachment":[{"href":"https:\/\/webdev.securin.xyz\/wp-json\/wp\/v2\/media?parent=7755"}],"wp:term":[{"taxonomy":"vulnerability_categories","embeddable":true,"href":"https:\/\/webdev.securin.xyz\/wp-json\/wp\/v2\/vulnerability_categories?post=7755"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}