First published: Wed Nov 18 2015(Updated: )
Multiple cross-site request forgery (CSRF) vulnerabilities in the D-Link DIR-816L Wireless Router with firmware before 2.06.B09_BETA allow remote attackers to hijack the authentication of administrators for requests that (1) change the admin password, (2) change the network policy, or (3) possibly have other unspecified impact via crafted requests to hedwig.cgi and pigwidgeon.cgi.
Credit: cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
dlink dir-816l firmware | <=2.05.b02 | |
dlink dir-816l |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-5999 is classified as a high-severity vulnerability due to its potential for remote exploitation.
To fix CVE-2015-5999, update the D-Link DIR-816L Wireless Router firmware to version 2.06.B09_BETA or later.
CVE-2015-5999 allows remote attackers to perform cross-site request forgery (CSRF) attacks, potentially changing the admin password or network policies.
CVE-2015-5999 affects users of the D-Link DIR-816L Wireless Router running firmware versions prior to 2.06.B09_BETA.
CVE-2015-5999 was published in November 2015.