On the D-Link DIR-615 before v20.12PTb04, if a victim logged in to the Router's Web Interface visits a malicious site from another Browser tab, the malicious site then can send requests to the victim's Router without knowing the credentials (CSRF). An attacker can host a page that sends a POST request to Form2File.htm that tries to upload Firmware to victim's Router. This causes the router to reboot/crash resulting in Denial of Service. An attacker may succeed in uploading malicious Firmware.
References
Link | Resource |
---|---|
ftp://ftp2.dlink.com/SECURITY_ADVISEMENTS/DIR-615/REVT/DIR-615_REVT_FIRMWARE_PATCH_v20.12PTb04.zip | Patch Vendor Advisory |
https://www.qualys.com/2017/03/12/qsa-2017-03-12/qsa-2017-03-12.pdf | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
No history.
Information
Published : 2017-07-07 12:29
Updated : 2024-02-04 19:29
NVD link : CVE-2017-7404
Mitre link : CVE-2017-7404
CVE.ORG link : CVE-2017-7404
JSON object : View
Products Affected
dlink
- dir-615
CWE
CWE-352
Cross-Site Request Forgery (CSRF)