First published: Tue Jan 13 2015(Updated: )
Multiple cross-site request forgery (CSRF) vulnerabilities in D-Link DAP-1360 with firmware 2.5.4 and earlier allow remote attackers to hijack the authentication of unspecified users for requests that change the (1) Enable Wireless, (2) MBSSID, (3) BSSID, (4) Hide Access Point, (5) SSID, (6) Country, (7) Channel, (8) Wireless mode, or (9) Max Associated Clients setting via a crafted request to index.cgi.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
D-Link DAP-1360 Firmware | <=2.5.4 | |
dlink DAP-1360 firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-10025 is classified as a high severity vulnerability due to its potential to allow unauthorized access and control over network settings.
To fix CVE-2014-10025, update your D-Link DAP-1360 firmware to version 2.5.5 or later.
CVE-2014-10025 affects D-Link DAP-1360 firmware versions 2.5.4 and earlier.
CVE-2014-10025 is associated with cross-site request forgery (CSRF) attacks.
CVE-2014-10025 allows attackers to hijack requests that change wireless settings, including SSID and security configurations.