D-Link DCC Protocol Security Bypass

High Nessus Plugin ID 47606


The remote network service is affected by a security bypass vulnerability.


The remote D-link Click 'n Connect Daemon does not implement any authentication and therefore allows remote attackers to view configuration and control server functions via the affected service.


Unknown at this time.

See Also



Plugin Details

Severity: High

ID: 47606

File Name: dlink_dccd_security_bypass.nasl

Version: $Revision: 1.5 $

Type: remote

Family: Misc.

Published: 2010/07/06

Modified: 2015/09/24

Dependencies: 47605

Risk Information

Risk Factor: High


Base Score: 8.3

Temporal Score: 7.9

Vector: CVSS2#AV:A/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:F/RL:U/RC:ND

Vulnerability Information

Required KB Items: Services/udp/dlink_dccd

Exploit Available: true

Exploit Ease: Exploits are available

Exploited by Nessus: true

Vulnerability Publication Date: 2010/06/28

Reference Information

BID: 41187