First published: Tue Jul 02 2019(Updated: )
An issue was discovered on D-Link DCS-1130 devices. The device provides a crossdomain.xml file with no restrictions on who can access the webserver. This allows an hosted flash file on any domain to make calls to the device's webserver and pull any information that is stored on the device. In this case, user's credentials are stored in clear text on the device and can be pulled easily. It also seems that the device does not implement any cross-site scripting forgery protection mechanism which allows an attacker to trick a user who is logged in to the web management interface into executing a cross-site flashing attack on the user's browser and execute any action on the device provided by the web management interface which steals the credentials from tools_admin.cgi file's response and displays it inside a Textfield.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Dlink Dcs-1130 Firmware | ||
Dlink Dcs-1130 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-8406 is a vulnerability found on D-Link DCS-1130 devices that allows unrestricted access to the webserver, enabling an attacker to retrieve sensitive information.
CVE-2017-8406 has a severity rating of 8.8 out of 10, indicating a high level of risk.
The affected software is D-Link DCS-1130 devices with firmware versions prior to the latest release.
An attacker can exploit CVE-2017-8406 by hosting a flash file on any domain and making unauthorized calls to the device's webserver.
Yes, updating the firmware of the D-Link DCS-1130 device to the latest release will fix CVE-2017-8406.