CVE-2019-13101
CRITICAL EXPLOITED NUCLEIDlink Dir-600m Firmware - Missing Authentication
Title source: ruleDescription
An issue was discovered on D-Link DIR-600M 3.02, 3.03, 3.04, and 3.06 devices. wan.htm can be accessed directly without authentication, which can lead to disclosure of information about the WAN, and can also be leveraged by an attacker to modify the data fields of the page.
Exploits (2)
exploitdb
SCANNER
by Devendra Singh Solanki · rubywebappshardware
https://www.exploit-db.com/exploits/47250
Nuclei Templates (1)
D-Link DIR-600M - Authentication Bypass
CRITICALby Suman_Kar
References (6)
Scores
CVSS v3
9.8
EPSS
0.8557
EPSS Percentile
99.4%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
VulnCheck KEV
2025-08-19
CWE
CWE-306
Status
published
Products (4)
dlink/dir-600m_firmware
3.02
dlink/dir-600m_firmware
3.03
dlink/dir-600m_firmware
3.04
dlink/dir-600m_firmware
3.06
Published
Aug 08, 2019
Tracked Since
Feb 18, 2026