D-Link DIR devices Authentication Bypass Vulnerability

Published: 2019-09-30 09:55:55
CVE Author: NIST National Vulnerability Database (NVD)

CVSS Base Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P

Detection Type:
Remote Vulnerability

Solution Type:
None Available

Summary:
Multiple D-Link DIR devices are prone to an authentication bypass vulnerability.

Detection Method:
Tries to access sensitive pages without authentication.

Technical Details:
The SharePort Web Access on D-Link DIR devices allows authentication bypass through a direct request to folder_view.php or category_view.php.

Impact:
Successful exploitation would allow an attacker to access sensitive data or execute php code contained in files on the target machine.

Affected Versions:
Following devices and firmwares are affected: - D-Link DIR-868L REVB through version 2.03 - D-Link DIR-885L REVA through version 1.20 - D-Link DIR-895L REVA through version 1.21 Other devices and firmware versions may also be affected.

Recommendations:
No known solution is available as of 30th September, 2019. Information regarding this issue will be updated once solution details are available.

NIST (National Institute of Standards and Technology) NVD (National Vulnerability Database)

https://nvd.nist.gov/vuln/detail/CVE-2019-16190

References:

https://cyberloginit.com/2019/09/10/dlink-shareport-web-access-authentication-bypass.html

Search
Severity
High
CVSS Score
7.5

You never have to pay for a vulnerability scanning and management software again.

Tired of paying a subscription 'per asset' or 'per IP'? Well you can officially cancel your current subscription. Mageni provides a free, open source and enterprise-ready vulnerability scanning and management platform which helps you to find, prioritize, remediate and manage your vulnerabilities. It is free and always will be.