First published: Mon Mar 25 2019(Updated: )
The D-Link DIR-816 A2 1.11 router only checks the random token when authorizing a goform request. An attacker can get this token from dir_login.asp and use an API URL /goform/setSysAdm to edit the web or system account without authentication.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Dlink Dir-816 Firmware | =1.11 | |
Dlink DIR-816 | =a2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-10039 is a vulnerability in the D-Link DIR-816 A2 1.11 router that allows an attacker to edit the web or system account without authentication.
CVE-2019-10039 has a severity rating of 9.8 (critical).
An attacker can exploit CVE-2019-10039 by obtaining the random token from dir_login.asp and using the API URL /goform/setSysAdm to edit the web or system account without authentication.
The D-Link DIR-816 A2 1.11 firmware is affected by CVE-2019-10039.
No, the D-Link DIR-816 A2 router is not vulnerable to CVE-2019-10039.