Multiple cross-site request forgery (CSRF) vulnerabilities on the D-Link DI-524 Wireless Router with firmware 9.01 allow remote attackers to (1) change the admin password, (2) reboot the device, or (3) possibly have unspecified other impact via crafted requests to CGI programs.
References
Link | Resource |
---|---|
http://seclists.org/fulldisclosure/2017/Feb/70 | Exploit Product Third Party Advisory VDB Entry |
http://www.securityfocus.com/bid/96475 | Third Party Advisory VDB Entry |
http://seclists.org/fulldisclosure/2017/Feb/70 | Exploit Product Third Party Advisory VDB Entry |
http://www.securityfocus.com/bid/96475 | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 03:28
Type | Values Removed | Values Added |
---|---|---|
References | () http://seclists.org/fulldisclosure/2017/Feb/70 - Exploit, Product, Third Party Advisory, VDB Entry | |
References | () http://www.securityfocus.com/bid/96475 - Third Party Advisory, VDB Entry |
Information
Published : 2017-03-06 06:59
Updated : 2024-11-21 03:28
NVD link : CVE-2017-5633
Mitre link : CVE-2017-5633
CVE.ORG link : CVE-2017-5633
JSON object : View
Products Affected
dlink
- di-524
d-link
- di-524_firmware
CWE
CWE-352
Cross-Site Request Forgery (CSRF)