An issue was discovered on D-Link DIR-816L devices 2.x before 1.10b04Beta02. There exists an exposed administration function in getcfg.php, which can be used to call various services. It can be utilized by an attacker to retrieve various sensitive information, such as admin login credentials, by setting the value of _POST_SERVICES in the query string to DEVICE.ACCOUNT.
References
Link | Resource |
---|---|
https://research.loginsoft.com/bugs/multiple-vulnerabilities-discovered-in-the-d-link-firmware-dir-816l/ | Third Party Advisory |
https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10169 | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
26 Apr 2023, 18:55
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:h:dlink:dir-816l:b1:*:*:*:*:*:*:* | |
CWE | CWE-306 |
Information
Published : 2020-07-22 19:15
Updated : 2024-02-04 21:00
NVD link : CVE-2020-15894
Mitre link : CVE-2020-15894
CVE.ORG link : CVE-2020-15894
JSON object : View
Products Affected
dlink
- dir-816l
- dir-816l_firmware
CWE
CWE-306
Missing Authentication for Critical Function