First published: Fri Aug 25 2017(Updated: )
D-Link DNS-320L firmware before 1.04b12, DNS-327L before 1.03b04 Build0119, DNR-326 1.40b03, DNS-320B 1.02b01, DNS-345 1.03b06, DNS-325 1.05b03, and DNS-322L 2.00b07 allow remote attackers to bypass authentication and log in with administrator permissions by passing the cgi_set_wto command in the cmd parameter, and setting the spawned session's cookie to username=admin.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
D-link Dns-322l Firmware | <=2.00b07 | |
Dlink Dns-322l | ||
<=1.05b03 | ||
Dlink Dns-325 | ||
D-link Dns-345 Firmware | <=1.03b06 | |
Dlink Dns-345 | ||
D-link Dns-320b Firmware | <=1.02b01 | |
Dlink Dns-320b | ||
D-link Dnr-326 Firmware | <=1.40b03 | |
Dlink Dnr-326 | ||
D-link Dns-327l Firmware | <=1.02 | |
Dlink Dns-327l | ||
D-Link DNS-320L firmware | <=1.03b04 | |
Dlink Dns-320l |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.