First published: Sat Oct 19 2013(Updated: )
The web interface on D-Link DIR-100, DIR-120, DI-624S, DI-524UP, DI-604S, DI-604UP, DI-604+, and TM-G5240 routers; Planex BRL-04R, BRL-04UR, and BRL-04CW routers; and Alpha Networks routers allows remote attackers to bypass authentication and modify settings via an xmlset_roodkcableoj28840ybtide User-Agent HTTP header, as exploited in the wild in October 2013.
Credit: cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
Dlink Di-524up | ||
Dlink Di-604\+ | ||
Dlink Di-604s | ||
Dlink Di-604up | ||
Dlink Di-624s | ||
Dlink Dir-100 | ||
Dlink Dir-120 | ||
Dlink Tm-g5240 | ||
Alphanetworks Vdsl Asl-55052 | ||
Alphanetworks Vdsl Asl-56552 | ||
Planex Brl-04cw | ||
Planex BRL-04R | ||
Planex Brl-04ur |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.