D-Link DIR-816 A2 <= 1.11 Multiple Vulnerabilities

Published: 2019-08-01 10:02:22
CVE Author: NIST National Vulnerability Database (NVD)

CVSS Base Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C

Detection Type:
Remote Vulnerability

Solution Type:
None Available

Summary:
D-Link DIR-816 devices are prone to multiple vulnerabilities.

Detection Method:
Tries to execute a command on the device.

Technical Details:
Following vulnerabilities exist: - An attacker can get a token from dir_login.asp and use an API URL /goform/setSysAdm to edit the web or system account without authentication. - An attacker can get a token from dir_login.asp and use a hidden API URL /goform/SystemCommand to execute a system command without authentication. - An attacker can get a token from dir_login.asp and use a hidden API URL /goform/form2userconfig.cgi to edit the system account without authentication. - An attacker can get a token form dir_login.asp and use a hidden API URL /goform/LoadDefaultSettings to reset the router without authentication.

Impact:
Successful exploitation would allow an attacker to gain complete control over the target device.

Affected Versions:
D-Link DIR-816 A2 through firmware version 1.11.

Recommendations:
No known solution is available as of 02nd August, 2019. Information regarding this issue will be updated once solution details are available.

NIST (National Institute of Standards and Technology) NVD (National Vulnerability Database)

https://nvd.nist.gov/vuln/detail/CVE-2019-11039
https://nvd.nist.gov/vuln/detail/CVE-2019-10040
https://nvd.nist.gov/vuln/detail/CVE-2019-10041
https://nvd.nist.gov/vuln/detail/CVE-2019-10042

References:

https://github.com/PAGalaxyLab/VulInfo/blob/master/D-Link/DIR-816/remote_cmd_exec_0/README.md
https://github.com/PAGalaxyLab/VulInfo/blob/master/D-Link/DIR-816/edit_sys_account/README.md
https://github.com/PAGalaxyLab/VulInfo/blob/master/D-Link/DIR-816/reset_router/README.md

Search
Severity
High
CVSS Score
10.0

You never have to pay for a vulnerability scanning and management software again.

Tired of paying a subscription 'per asset' or 'per IP'? Well you can officially cancel your current subscription. Mageni provides a free, open source and enterprise-ready vulnerability scanning and management platform which helps you to find, prioritize, remediate and manage your vulnerabilities. It is free and always will be.