CVE-2019-7388

An issue was discovered in /bin/goahead on D-Link DIR-823G devices with firmware 1.02B03. There is incorrect access control allowing remote attackers to get sensitive information (such as MAC address) about all clients in the WLAN via the GetClientInfo HNAP API. Consequently, an attacker can achieve information disclosure without authentication.
References
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:dlink:dir-823g_firmware:1.02b03:*:*:*:*:*:*:*
cpe:2.3:h:dlink:dir-823g:-:*:*:*:*:*:*:*

History

21 Nov 2024, 04:48

Type Values Removed Values Added
References () http://www.securityfocus.com/bid/106852 - Third Party Advisory () http://www.securityfocus.com/bid/106852 - Third Party Advisory
References () https://github.com/leonW7/D-Link/blob/master/Vul_3.md - Exploit, Third Party Advisory () https://github.com/leonW7/D-Link/blob/master/Vul_3.md - Exploit, Third Party Advisory

Information

Published : 2019-02-05 00:29

Updated : 2024-11-21 04:48


NVD link : CVE-2019-7388

Mitre link : CVE-2019-7388

CVE.ORG link : CVE-2019-7388


JSON object : View

Products Affected

dlink

  • dir-823g_firmware
  • dir-823g
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor