First published: Fri Jul 07 2017(Updated: )
On the D-Link DIR-615 before v20.12PTb04, if a victim logged in to the Router's Web Interface visits a malicious site from another Browser tab, the malicious site then can send requests to the victim's Router without knowing the credentials (CSRF). An attacker can host a page that sends a POST request to Form2File.htm that tries to upload Firmware to victim's Router. This causes the router to reboot/crash resulting in Denial of Service. An attacker may succeed in uploading malicious Firmware.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
D-Link DIR-615 | <=20.12ptb01 | |
D-Link DIR-615 |
ftp://ftp2.dlink.com/SECURITY_ADVISEMENTS/DIR-615/REVT/DIR-615_REVT_FIRMWARE_PATCH_v20.12PTb04.zip
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-7404 has been classified as a medium severity vulnerability due to its potential for exploitation via cross-site request forgery.
To fix CVE-2017-7404, update the D-Link DIR-615 router to firmware version 20.12PTb04 or later.
CVE-2017-7404 affects the D-Link DIR-615 router models with firmware versions prior to 20.12PTb04.
CVE-2017-7404 can be exploited through a cross-site request forgery (CSRF) attack that allows unauthorized commands to be sent to the router.
Yes, CVE-2017-7404 can be exploited remotely if the victim is tricked into visiting a malicious site while logged into the router's web interface.