First published: Mon Mar 25 2019(Updated: )
The D-Link DIR-816 A2 1.11 router only checks the random token when authorizing a goform request. An attacker can get this token from dir_login.asp and use an API URL /goform/LoadDefaultSettings to reset the router without authentication.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Dlink Dir-816 Firmware | =1.11 | |
Dlink DIR-816 | =a2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-10042 is a vulnerability in the D-Link DIR-816 A2 1.11 router that allows an attacker to reset the router without authentication.
CVE-2019-10042 takes advantage of the router's failure to properly check the random token when authorizing a goform request, allowing an attacker to obtain the token from dir_login.asp and use an API URL to reset the router without authentication.
CVE-2019-10042 has a severity rating of 7.5, which is considered high.
The D-Link DIR-816 A2 1.11 router firmware version is affected by CVE-2019-10042.
To fix CVE-2019-10042, it is recommended to update the D-Link DIR-816 A2 router firmware to a version that addresses the vulnerability.