CVE-2019-7390

An issue was discovered in /bin/goahead on D-Link DIR-823G devices with firmware 1.02B03. There is incorrect access control allowing remote attackers to hijack the DNS service configuration of all clients in the WLAN, without authentication, via the SetWanSettings HNAP API.
References
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:dlink:dir-823g_firmware:1.02b03:*:*:*:*:*:*:*
cpe:2.3:h:dlink:dir-823g:-:*:*:*:*:*:*:*

History

21 Nov 2024, 04:48

Type Values Removed Values Added
References () http://www.securityfocus.com/bid/106855 - Third Party Advisory () http://www.securityfocus.com/bid/106855 - Third Party Advisory
References () https://github.com/leonW7/D-Link/blob/master/Vul_5.md - Exploit, Third Party Advisory () https://github.com/leonW7/D-Link/blob/master/Vul_5.md - Exploit, Third Party Advisory

Information

Published : 2019-02-05 00:29

Updated : 2024-11-21 04:48


NVD link : CVE-2019-7390

Mitre link : CVE-2019-7390

CVE.ORG link : CVE-2019-7390


JSON object : View

Products Affected

dlink

  • dir-823g_firmware
  • dir-823g
CWE
CWE-306

Missing Authentication for Critical Function