{"id":7827,"date":"2018-12-05T20:41:30","date_gmt":"2018-12-06T03:41:30","guid":{"rendered":"https:\/\/webdev.securin.xyz\/?post_type=zerodays&p=7827"},"modified":"2023-02-06T13:21:02","modified_gmt":"2023-02-06T20:21:02","slug":"cve-2018-20432-dlink","status":"publish","type":"zerodays","link":"https:\/\/webdev.securin.xyz\/zerodays\/cve-2018-20432-dlink\/","title":{"rendered":"CVE-2018-20432 – Hardcoded credentials in DLink CoVR-2600R Router"},"content":{"rendered":"

The latest versions of the firmware have hardcoded default credentials that can be exploited by an unauthenticated attacker to gain privileged access to the firmware and to extract sensitive data.<\/p>\n

 <\/p>\n","protected":false},"featured_media":7742,"parent":0,"menu_order":0,"template":"","vulnerability_categories":[],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/webdev.securin.xyz\/wp-json\/wp\/v2\/zerodays\/7827"}],"collection":[{"href":"https:\/\/webdev.securin.xyz\/wp-json\/wp\/v2\/zerodays"}],"about":[{"href":"https:\/\/webdev.securin.xyz\/wp-json\/wp\/v2\/types\/zerodays"}],"version-history":[{"count":4,"href":"https:\/\/webdev.securin.xyz\/wp-json\/wp\/v2\/zerodays\/7827\/revisions"}],"predecessor-version":[{"id":13695,"href":"https:\/\/webdev.securin.xyz\/wp-json\/wp\/v2\/zerodays\/7827\/revisions\/13695"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/webdev.securin.xyz\/wp-json\/wp\/v2\/media\/7742"}],"wp:attachment":[{"href":"https:\/\/webdev.securin.xyz\/wp-json\/wp\/v2\/media?parent=7827"}],"wp:term":[{"taxonomy":"vulnerability_categories","embeddable":true,"href":"https:\/\/webdev.securin.xyz\/wp-json\/wp\/v2\/vulnerability_categories?post=7827"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}