First published: Thu Feb 06 2014(Updated: )
Cross-site request forgery (CSRF) vulnerability in D-Link DAP-2253 Access Point (Rev. A1) with firmware before 1.30 allows remote attackers to hijack the authentication of administrators for requests that modify configuration settings via unspecified vectors.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
D-Link DAP-2253 Firmware | <=1.26rc55 | |
D-Link DAP-2253 | =a1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-7320 has been classified with a high severity rating due to its potential to allow unauthorized access and changes to device configurations.
To fix CVE-2013-7320, upgrade the firmware of the D-Link DAP-2253 Access Point to version 1.30 or later.
CVE-2013-7320 affects the D-Link DAP-2253 Access Point (Rev. A1) with firmware versions prior to 1.30.
CVE-2013-7320 is a Cross-Site Request Forgery (CSRF) vulnerability allowing attackers to perform unauthorized actions on behalf of logged-in users.
Yes, CVE-2013-7320 can be exploited remotely by an attacker to hijack the authentication of administrators without physical access.