PatchSiren

PatchSiren cyber security CVE debrief

CVE-2017-6206 Dlink CVE debrief

CVE-2017-6206 is a high-severity unauthenticated information disclosure issue affecting D-Link DGS-1510 Websmart firmware. The NVD record maps the vulnerable surface to the DGS-1510 series firmware and scores it CVSS 3.0 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N), indicating network-reachable confidentiality impact without integrity or availability impact. Organizations that expose these switch management interfaces should prioritize patching and access restriction.

Vendor
Dlink
Product
CVE-2017-6206
CVSS
HIGH 7.5
CISA KEV
Not listed in stored evidence
Original CVE published
2017-02-23
Original CVE updated
2026-05-13
Advisory published
2017-02-23
Advisory updated
2026-05-13

Who should care

Network administrators, infrastructure teams, and security owners managing D-Link DGS-1510 Websmart switches, especially where web management is reachable from user or untrusted networks. Asset owners should also care if these devices are used in sensitive internal segments, since information disclosure from a switch can expose configuration or topology details that aid further compromise.

Technical summary

According to the supplied CVE description, D-Link DGS-1510-28XMP, DGS-1510-28X, DGS-1510-52X, DGS-1510-52, DGS-1510-28P, DGS-1510-28, and DGS-1510-20 Websmart devices with firmware before 1.31.B003 are vulnerable to unauthenticated information disclosure via unspecified vectors. NVD’s CPE data identifies the vulnerable target as the Websmart DGS-1510 series firmware and marks the individual hardware entries as non-vulnerable, which supports treating this as a firmware issue rather than a hardware flaw. The recorded weakness is CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor).

Defensive priority

High for any environment with exposed or remotely reachable D-Link DGS-1510 Websmart management interfaces. The issue is unauthenticated, network-reachable, and rated High by CVSS, so it warrants prompt remediation even though the supplied timeline does not include a KEV entry.

Recommended defensive actions

  • Inventory all D-Link DGS-1510 Websmart devices and confirm exact firmware versions.
  • Upgrade affected firmware using the vendor guidance referenced in SAP10070 and verify devices are on a fixed release newer than the vulnerable range.
  • Restrict switch web management to trusted admin networks, VPNs, or dedicated management VLANs only.
  • Review whether any configuration, credentials, or topology information could have been exposed and rotate sensitive secrets if needed.
  • Monitor logs and management access for unexpected requests or changes around the affected devices.
  • If patching cannot be completed immediately, reduce exposure by disabling unnecessary management access paths and enforcing network segmentation.

Evidence notes

Primary evidence comes from the supplied CVE/NVD record: published 2017-02-23 and modified 2026-05-13, with CVSS 3.0 vector AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N and CWE-200. The NVD CPE data marks the Websmart DGS-1510 firmware series as vulnerable and specific hardware CPEs as non-vulnerable. There is a source-corpus discrepancy on the affected firmware cutoff: the CVE description says firmware before 1.31.B003, while NVD lists versionEndIncluding 1.31.b001. A vendor advisory/patch reference (SAP10070) is included in the corpus.

Official resources

Public vulnerability disclosure; CVE published on 2017-02-23. No KEV entry is present in the supplied timeline, and no weaponized reproduction details are included here.