First published: Fri May 03 2024(Updated: )
D-Link G416 httpd Missing Authentication for Critical Function Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of D-Link G416 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the HTTP service listening on TCP port 80. The issue results from the lack of authentication prior to allowing access to functionality. An attacker can leverage this vulnerability to gain access to critical functions on the device. Was ZDI-CAN-21287.
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
D-Link G416 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-50199 is categorized as a critical vulnerability due to its potential for remote code execution.
To mitigate CVE-2023-50199, ensure that your D-Link G416 router firmware is updated to the latest version provided by D-Link.
CVE-2023-50199 affects installations of the D-Link G416 router that have not implemented security measures.
CVE-2023-50199 allows network-adjacent attackers to bypass authentication and execute arbitrary code on affected devices.
Currently, there are no known workarounds for CVE-2023-50199 other than restricting access to the router's administrative interface.