CVE-2019-19598

D-Link DAP-1860 devices before v1.04b03 Beta allow access to administrator functions without authentication via the HNAP_AUTH header timestamp value. In HTTP requests, part of the HNAP_AUTH header is the timestamp used to determine the time when the user sent the request. If this value is equal to the value stored in the device's /var/hnap/timestamp file, the request will pass the HNAP_AUTH check function.
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:o:dlink:dap-1860_firmware:1.01b06:*:*:*:*:*:*:*
cpe:2.3:o:dlink:dap-1860_firmware:1.02b01:*:*:*:*:*:*:*
cpe:2.3:o:dlink:dap-1860_firmware:1.04b01:*:*:*:*:*:*:*
cpe:2.3:h:dlink:dap-1860:-:*:*:*:*:*:*:*

History

21 Nov 2024, 04:35

Type Values Removed Values Added
References () https://chung96vn.wordpress.com/2019/11/15/d-link-dap-1860-vulnerabilities/ - Exploit, Third Party Advisory () https://chung96vn.wordpress.com/2019/11/15/d-link-dap-1860-vulnerabilities/ - Exploit, Third Party Advisory
References () https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10135 - Third Party Advisory () https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10135 - Third Party Advisory

Information

Published : 2019-12-05 04:15

Updated : 2024-11-21 04:35


NVD link : CVE-2019-19598

Mitre link : CVE-2019-19598

CVE.ORG link : CVE-2019-19598


JSON object : View

Products Affected

dlink

  • dap-1860
  • dap-1860_firmware
CWE
CWE-287

Improper Authentication