Critical severity9.8NVD Advisory· Published Dec 16, 2017· Updated May 13, 2026
CVE-2017-3192
CVE-2017-3192
Description
D-Link DIR-130 firmware version 1.23 and DIR-330 firmware version 1.12 do not sufficiently protect administrator credentials. The tools_admin.asp page discloses the administrator password in base64 encoding in the returned web page. A remote attacker with access to this page (potentially through a authentication bypass such as CVE-2017-3191) may obtain administrator credentials for the device.
Affected products
4- cpe:2.3:o:d-link:dir-130_firmware:1.23:*:*:*:*:*:*:*
- cpe:2.3:o:d-link:dir-330_firmware:1.12:*:*:*:*:*:*:*
- D-Link/DIR-130v5Range: 1.23
- D-Link/DIR-330v5Range: 1.12
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- exchange.xforce.ibmcloud.com/vulnerabilities/123292nvdIssue TrackingThird Party AdvisoryVDB Entry
- www.kb.cert.org/vuls/id/553503nvdIssue TrackingThird Party AdvisoryUS Government Resource
- www.scmagazine.com/d-link-dir-130-and-dir-330-routers-vulnerable/article/644553/nvdThird Party Advisory
- www.wilderssecurity.com/threads/d-link-dir-130-and-dir-330-are-vulnerable-to-authentication-bypass-and-do-not-protect-credentials.392703/nvdIssue TrackingThird Party Advisory
News mentions
0No linked articles in our index yet.