Логотип exploitDog
bind:CVE-2024-13104
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-13104

Количество 3

Количество 3

nvd логотип

CVE-2024-13104

около 1 года назад

A vulnerability, which was classified as critical, was found in D-Link DIR-816 A2 1.10CNB05_R1B011D88210. Affected is an unknown function of the file /goform/form2AdvanceSetup.cgi of the component WiFi Settings Handler. The manipulation leads to improper access controls. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.

CVSS3: 5.3
EPSS: Низкий
github логотип

GHSA-4xf5-7w4v-4xjr

около 1 года назад

A vulnerability, which was classified as critical, was found in D-Link DIR-816 A2 1.10CNB05_R1B011D88210. Affected is an unknown function of the file /goform/form2AdvanceSetup.cgi of the component WiFi Settings Handler. The manipulation leads to improper access controls. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.

CVSS3: 5.3
EPSS: Низкий
fstec логотип

BDU:2025-02177

около 1 года назад

Уязвимость сценария form2AdvanceSetup.cgi (/goform/form2AdvanceSetup.cgi) компонента WiFi Settings Handler микропрограммного обеспечения маршрутизаторов D-Link DIR-816 A2, позволяющая нарушителю оказать воздействие на целостность защищаемой информации

CVSS3: 5.3
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-13104

A vulnerability, which was classified as critical, was found in D-Link DIR-816 A2 1.10CNB05_R1B011D88210. Affected is an unknown function of the file /goform/form2AdvanceSetup.cgi of the component WiFi Settings Handler. The manipulation leads to improper access controls. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.

CVSS3: 5.3
0%
Низкий
около 1 года назад
github логотип
GHSA-4xf5-7w4v-4xjr

A vulnerability, which was classified as critical, was found in D-Link DIR-816 A2 1.10CNB05_R1B011D88210. Affected is an unknown function of the file /goform/form2AdvanceSetup.cgi of the component WiFi Settings Handler. The manipulation leads to improper access controls. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.

CVSS3: 5.3
0%
Низкий
около 1 года назад
fstec логотип
BDU:2025-02177

Уязвимость сценария form2AdvanceSetup.cgi (/goform/form2AdvanceSetup.cgi) компонента WiFi Settings Handler микропрограммного обеспечения маршрутизаторов D-Link DIR-816 A2, позволяющая нарушителю оказать воздействие на целостность защищаемой информации

CVSS3: 5.3
0%
Низкий
около 1 года назад

Уязвимостей на страницу