First published: Tue Apr 04 2017(Updated: )
D-Link DIR-615 HW: T1 FW:20.09 is vulnerable to Cross-Site Request Forgery (CSRF) vulnerability. This enables an attacker to perform an unwanted action on a wireless router for which the user/admin is currently authenticated, as demonstrated by changing the Security option from WPA2 to None, or changing the hiddenSSID parameter, SSID parameter, or a security-option password.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
D-Link DIR-615GF Firmware | =20.09 | |
D-Link DIR-615 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-7398 is classified as a medium severity Cross-Site Request Forgery (CSRF) vulnerability.
To mitigate CVE-2017-7398, upgrade your D-Link DIR-615 firmware to a version that addresses this vulnerability.
An attacker can execute unauthorized actions, such as changing the router's security settings while the user is authenticated.
CVE-2017-7398 affects D-Link DIR-615 firmware version 20.09.
Yes, CVE-2017-7398 can be exploited remotely if the attacker has network access to the vulnerable router.