First published: Fri Nov 22 2019(Updated: )
Multiple cross-site request forgery (CSRF) vulnerabilities in the D-Link DSL-6740U gateway (Rev. H1) allow remote attackers to hijack the authentication of administrators for requests that change administrator credentials or enable remote management services to (1) Custom Services in Port Forwarding, (2) Port Triggering Entries, (3) URL Filters in Parental Control, (4) Print Server settings, (5) QoS Queue Setup, or (6) QoS Classification Entries.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
D-link Dsl6740u Firmware | ||
D-link Dsl6740u | =h1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-6811 has a medium severity rating due to its ability to allow remote attackers to hijack authentication.
To fix CVE-2013-6811, update the firmware of the D-Link DSL-6740U gateway to the latest version provided by D-Link.
CVE-2013-6811 allows attackers to perform cross-site request forgery (CSRF) attacks that can change administrator credentials or enable remote management.
CVE-2013-6811 affects the D-Link DSL-6740U gateway, specifically Rev. H1.
Yes, CVE-2013-6811 remains a risk for users who have not applied the necessary firmware updates to mitigate the vulnerability.