Multiple cross-site request forgery (CSRF) vulnerabilities in the D-Link DSL-6740U gateway (Rev. H1) allow remote attackers to hijack the authentication of administrators for requests that change administrator credentials or enable remote management services to (1) Custom Services in Port Forwarding, (2) Port Triggering Entries, (3) URL Filters in Parental Control, (4) Print Server settings, (5) QoS Queue Setup, or (6) QoS Classification Entries.
References
Link | Resource |
---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/89612 | Third Party Advisory VDB Entry |
https://web.archive.org/web/20131208091355/http://securityadvisories.dlink.com/security/publication.aspx?name=SAP10005 | Third Party Advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/89612 | Third Party Advisory VDB Entry |
https://web.archive.org/web/20131208091355/http://securityadvisories.dlink.com/security/publication.aspx?name=SAP10005 | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 01:59
Type | Values Removed | Values Added |
---|---|---|
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/89612 - Third Party Advisory, VDB Entry | |
References | () https://web.archive.org/web/20131208091355/http://securityadvisories.dlink.com/security/publication.aspx?name=SAP10005 - Third Party Advisory |
Information
Published : 2019-11-22 18:15
Updated : 2024-11-21 01:59
NVD link : CVE-2013-6811
Mitre link : CVE-2013-6811
CVE.ORG link : CVE-2013-6811
JSON object : View
Products Affected
d-link
- dsl6740u_firmware
- dsl6740u
CWE
CWE-352
Cross-Site Request Forgery (CSRF)