First published: Wed Mar 04 2020(Updated: )
A Broken Access Control vulnerability in the D-Link DSL-2680 web administration interface (Firmware EU_1.03) allows an attacker to download the configuration (binary file) settings by submitting a rom-0 GET request without being authenticated on the admin interface.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Dlink Dsl-2680 Firmware | =1.03 | |
Dlink Dsl-2680 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-19224 is a Broken Access Control vulnerability in the D-Link DSL-2680 web administration interface that allows unauthorized access to configuration settings.
The consequences of CVE-2019-19224 include the potential for an attacker to download sensitive configuration files without authentication.
To fix CVE-2019-19224, update the D-Link DSL-2680 firmware to the latest version or disable remote administration features.
If you are using the D-Link DSL-2680 with firmware version EU_1.03, then your device is vulnerable to CVE-2019-19224.
To prevent exploitation of CVE-2019-19224, ensure that your devices are regularly updated and limit access to administrative interfaces.