First published: Sat Jul 06 2019(Updated: )
A SQL Injection was discovered in D-Link Central WiFi Manager CWM(100) before v1.03R0100_BETA6 in PayAction.class.php with the index.php/Pay/passcodeAuth parameter passcode. The vulnerability does not need any authentication.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Dlink Central Wifimanager | =1.03 | |
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2019-13375 is critical with a score of 9.8.
The affected software of CVE-2019-13375 is D-Link Central WiFi Manager (CWM) version 1.03.
The SQL Injection vulnerability in CVE-2019-13375 is exploited through the 'passcodeAuth' parameter in the 'index.php/Pay' path of the D-Link Central WiFi Manager (CWM) application.
No, authentication is not required to exploit the SQL Injection vulnerability in CVE-2019-13375.
No, Microsoft Windows is not affected by CVE-2019-13375.