An issue was discovered on D-Link DIR-816L devices 2.x before 1.10b04Beta02. There exists an exposed administration function in getcfg.php, which can be used to call various services. It can be utilized by an attacker to retrieve various sensitive information, such as admin login credentials, by setting the value of _POST_SERVICES in the query string to DEVICE.ACCOUNT.
                
            References
                    | Link | Resource | 
|---|---|
| https://research.loginsoft.com/bugs/multiple-vulnerabilities-discovered-in-the-d-link-firmware-dir-816l/ | Third Party Advisory | 
| https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10169 | Patch Vendor Advisory | 
Configurations
                    Configuration 1 (hide)
| AND | 
 
 | 
Information
                Published : 2020-07-22 12:15
Updated : 2021-07-21 04:39
NVD link : CVE-2020-15894
Mitre link : CVE-2020-15894
JSON object : View
CWE
                
                    
                        
                        CWE-306
                        
            Missing Authentication for Critical Function
Products Affected
                d-link
- dir-816l
- dir-816l_firmware


