First published: Mon Oct 14 2019(Updated: )
There are some web interfaces without authentication requirements on D-Link DIR-412 A1-1.14WW routers. An attacker can get the router's log file via log_get.php, which could be used to discover the intranet network structure.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Dlink Dir-412 Firmware | =a1-1.14ww | |
Dlink Dir-412 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-17511 has a medium severity rating due to the potential exposure of sensitive router log files.
To mitigate CVE-2019-17511, secure the web interface with strong authentication and upgrade to a later firmware version if available.
CVE-2019-17511 affects D-Link DIR-412 routers running firmware version a1-1.14WW.
Exploiting CVE-2019-17511 allows unauthorized access to the router's log file, which may reveal the intranet network structure.
Yes, CVE-2019-17511 is classified as an authentication vulnerability due to the lack of authentication requirements on the web interface.