First published: Tue Nov 19 2013(Updated: )
Multiple cross-site request forgery (CSRF) vulnerabilities in D-Link DSL-2740B Gateway with firmware EU_1.00 allow remote attackers to hijack the authentication of administrators for requests that (1) enable or disable Wireless MAC Address Filters via a wlFltMode action to wlmacflt.cmd, (2) enable or disable firewall protections via a request to scdmz.cmd, or (3) enable or disable remote management via a save action to scsrvcntr.cmd.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
D-Link DSL-2740B Firmware | =1.00 | |
Dlink Dsl-2740b Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-5730 is classified as a medium severity vulnerability due to its potential for impacting sensitive configuration settings.
To fix CVE-2013-5730, users should upgrade the D-Link DSL-2740B Gateway firmware to a version that addresses the CSRF vulnerabilities.
CVE-2013-5730 affects users of the D-Link DSL-2740B Gateway firmware version 1.00.
CVE-2013-5730 is a type of Cross-Site Request Forgery (CSRF) vulnerability.
An attacker could exploit CVE-2013-5730 to hijack administrative authentication and potentially modify important router settings.