An issue was discovered on D-Link DIR-816L devices 2.x before 1.10b04Beta02. There exists an exposed administration function in getcfg.php, which can be used to call various services. It can be utilized by an attacker to retrieve various sensitive information, such as admin login credentials, by setting the value of _POST_SERVICES in the query string to DEVICE.ACCOUNT.
References
Link | Resource |
---|---|
https://research.loginsoft.com/bugs/multiple-vulnerabilities-discovered-in-the-d-link-firmware-dir-816l/ | Third Party Advisory |
https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10169 | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Information
Published : 2020-07-22 12:15
Updated : 2021-07-21 04:39
NVD link : CVE-2020-15894
Mitre link : CVE-2020-15894
JSON object : View
CWE
CWE-306
Missing Authentication for Critical Function
Products Affected
d-link
- dir-816l
- dir-816l_firmware