Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-4xf5-7w4v-4xjr

Опубликовано: 02 янв. 2025
Источник: github
Github: Не прошло ревью
CVSS4: 6.9
CVSS3: 5.3

Описание

A vulnerability, which was classified as critical, was found in D-Link DIR-816 A2 1.10CNB05_R1B011D88210. Affected is an unknown function of the file /goform/form2AdvanceSetup.cgi of the component WiFi Settings Handler. The manipulation leads to improper access controls. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.

A vulnerability, which was classified as critical, was found in D-Link DIR-816 A2 1.10CNB05_R1B011D88210. Affected is an unknown function of the file /goform/form2AdvanceSetup.cgi of the component WiFi Settings Handler. The manipulation leads to improper access controls. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.

EPSS

Процентиль: 35%
0.00143
Низкий

6.9 Medium

CVSS4

5.3 Medium

CVSS3

Дефекты

CWE-266

Связанные уязвимости

CVSS3: 5.3
nvd
около 1 года назад

A vulnerability, which was classified as critical, was found in D-Link DIR-816 A2 1.10CNB05_R1B011D88210. Affected is an unknown function of the file /goform/form2AdvanceSetup.cgi of the component WiFi Settings Handler. The manipulation leads to improper access controls. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.

CVSS3: 5.3
fstec
около 1 года назад

Уязвимость сценария form2AdvanceSetup.cgi (/goform/form2AdvanceSetup.cgi) компонента WiFi Settings Handler микропрограммного обеспечения маршрутизаторов D-Link DIR-816 A2, позволяющая нарушителю оказать воздействие на целостность защищаемой информации

EPSS

Процентиль: 35%
0.00143
Низкий

6.9 Medium

CVSS4

5.3 Medium

CVSS3

Дефекты

CWE-266