First published: Mon Mar 25 2019(Updated: )
The D-Link DIR-816 A2 1.11 router only checks the random token when authorizing a goform request. An attacker can get this token from dir_login.asp and use an API URL /goform/form2userconfig.cgi to edit the system account without authentication.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Dlink Dir-816 Firmware | =1.11 | |
Dlink DIR-816 | =a2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-10041 is a vulnerability found in the D-Link DIR-816 A2 1.11 router that allows an attacker to edit the system account without authentication.
CVE-2019-10041 has a severity rating of 9.8, which is considered critical.
An attacker can exploit CVE-2019-10041 by obtaining the random token from dir_login.asp and using an API URL to edit the system account without authentication.
The D-Link DIR-816 A2 firmware version 1.11 is affected by CVE-2019-10041.
Yes, the D-Link DIR-816 A2 is vulnerable to CVE-2019-10041.