An issue was discovered on D-Link DIR-816L devices 2.x before 1.10b04Beta02. There exists an exposed administration function in getcfg.php, which can be used to call various services. It can be utilized by an attacker to retrieve various sensitive information, such as admin login credentials, by setting the value of _POST_SERVICES in the query string to DEVICE.ACCOUNT.
References
Link | Resource |
---|---|
https://research.loginsoft.com/bugs/multiple-vulnerabilities-discovered-in-the-d-link-firmware-dir-816l/ | Third Party Advisory |
https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10169 | Patch Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2020-07-22T18:55:56
Updated: 2020-07-22T18:55:56
Reserved: 2020-07-22T00:00:00
Link: CVE-2020-15894
JSON object: View
NVD Information
Status : Analyzed
Published: 2020-07-22T19:15:12.710
Modified: 2023-11-08T22:49:55.577
Link: CVE-2020-15894
JSON object: View
Redhat Information
No data.
CWE