First published: Tue Jan 13 2015(Updated: )
D-Link DIR-600 routers contain a cross-site request forgery (CSRF) vulnerability that allows an attacker to change router configurations by hijacking an existing administrator session.
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
D-Link DIR-600 | ||
All of | ||
D-Link DIR-600L Firmware | <=2.16ww | |
D-Link DIR-600 | ||
D-Link DIR-600M Firmware | <=2.16ww | |
D-Link DIR-60 |
This vulnerability affects legacy D-Link products. All associated hardware revisions have reached their end-of-life (EOL) or end-of-service (EOS) life cycle and should be retired and replaced per vendor instructions.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-100005 is classified as a medium severity vulnerability due to its potential to enable unauthorized configuration changes.
To mitigate CVE-2014-100005, update the D-Link DIR-600 firmware to a version above 2.16ww.
CVE-2014-100005 can be exploited through cross-site request forgery (CSRF) attacks that hijack an existing administrator session.
Users of D-Link DIR-600 routers running firmware versions up to 2.16ww are affected by CVE-2014-100005.
CVE-2014-100005 allows attackers to change router configurations, potentially compromising network security.