First published: Mon Mar 25 2019(Updated: )
The D-Link DIR-816 A2 1.11 router only checks the random token when authorizing a goform request. An attacker can get this token from dir_login.asp and use a hidden API URL /goform/SystemCommand to execute a system command without authentication.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Dlink Dir-816 Firmware | =1.11 | |
Dlink DIR-816 | =a2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2019-10040 is critical with a score of 9.8.
The vulnerability in D-Link DIR-816 A2 1.11 router allows an attacker to execute system commands without authentication.
An attacker can exploit CVE-2019-10040 by obtaining the random token from dir_login.asp and using the hidden API URL /goform/SystemCommand to execute system commands without authentication.
CVE-2019-10040 affects D-Link DIR-816 Firmware version 1.11.
No, D-Link DIR-816 A2 is not vulnerable to CVE-2019-10040.