CVE-2019-19226

A Broken Access Control vulnerability in the D-Link DSL-2680 web administration interface (Firmware EU_1.03) allows an attacker to enable or disable MAC address filtering by submitting a crafted Forms/WlanMacFilter_1 POST request without being authenticated on the admin interface.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:dlink:dsl-2680_firmware:1.03:*:*:*:*:*:*:*
cpe:2.3:h:dlink:dsl-2680:-:*:*:*:*:*:*:*

History

21 Nov 2024, 04:34

Type Values Removed Values Added
References () https://github.com/0x8b30cc/DSL-2680-Multiple-Vulnerabilities - Third Party Advisory () https://github.com/0x8b30cc/DSL-2680-Multiple-Vulnerabilities - Third Party Advisory
References () https://github.com/0x8b30cc/DSL-2680-Multiple-Vulnerabilities/blob/master/CVE-2019-19226.md - Exploit, Third Party Advisory () https://github.com/0x8b30cc/DSL-2680-Multiple-Vulnerabilities/blob/master/CVE-2019-19226.md - Exploit, Third Party Advisory
References () https://www.dlink.com/en/security-bulletin - Vendor Advisory () https://www.dlink.com/en/security-bulletin - Vendor Advisory
References () https://www.ftc.gov/system/files/documents/cases/dlink_proposed_order_and_judgment_7-2-19.pdf - Third Party Advisory, US Government Resource () https://www.ftc.gov/system/files/documents/cases/dlink_proposed_order_and_judgment_7-2-19.pdf - Third Party Advisory, US Government Resource

Information

Published : 2020-03-04 19:15

Updated : 2024-11-21 04:34


NVD link : CVE-2019-19226

Mitre link : CVE-2019-19226

CVE.ORG link : CVE-2019-19226


JSON object : View

Products Affected

dlink

  • dsl-2680_firmware
  • dsl-2680
CWE
CWE-306

Missing Authentication for Critical Function