Multiple cross-site request forgery (CSRF) vulnerabilities in D-Link DIR-600 router (rev. Bx) with firmware before 2.17b02 allow remote attackers to hijack the authentication of administrators for requests that (1) create an administrator account or (2) enable remote management via a crafted configuration module to hedwig.cgi, (3) activate new configuration settings via a SETCFG,SAVE,ACTIVATE action to pigwidgeon.cgi, or (4) send a ping via a ping action to diagnostic.php.
References
Link | Resource |
---|---|
http://resources.infosecinstitute.com/csrf-unauthorized-remote-admin-access/ | Exploit Third Party Advisory |
http://secunia.com/advisories/57304 | Broken Link |
http://securityadvisories.dlink.com/security/publication.aspx?name=SAP10018 | Patch Vendor Advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/91794 | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
AND |
|
History
13 Aug 2024, 19:12
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 6.8
v3 : 8.8 |
01 Aug 2024, 13:41
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 6.8
v3 : 8.0 |
Information
Published : 2015-01-13 11:59
Updated : 2024-08-13 19:12
NVD link : CVE-2014-100005
Mitre link : CVE-2014-100005
CVE.ORG link : CVE-2014-100005
JSON object : View
Products Affected
dlink
- dir-600_firmware
- dir-600
CWE
CWE-352
Cross-Site Request Forgery (CSRF)