First published: Tue Feb 05 2019(Updated: )
An issue was discovered in /bin/goahead on D-Link DIR-823G devices with the firmware 1.02B03. There is incorrect access control allowing remote attackers to reset the router without authentication via the SetFactoryDefault HNAP API. Consequently, an attacker can achieve a denial-of-service attack without authentication.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Dlink Dir-823g Firmware | =1.02b03 | |
Dlink Dir-823g | ||
All of | ||
Dlink Dir-823g Firmware | =1.02b03 | |
Dlink Dir-823g |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-7389 is an issue discovered in /bin/goahead on D-Link DIR-823G devices with the firmware 1.02B03.
The severity of CVE-2019-7389 is high with a CVSS score of 7.5.
Remote attackers can exploit CVE-2019-7389 by resetting the router without authentication via the SetFactoryDefault HNAP API.
The impact of CVE-2019-7389 is a denial-of-service attack, where an attacker can reset the D-Link DIR-823G router without authentication.
Yes, D-Link DIR-823G devices with firmware version 1.02B03 are vulnerable to CVE-2019-7389.