First published: Fri May 03 2024(Updated: )
D-Link G416 httpd Improper Handling of Exceptional Conditions Information Disclosure Vulnerability. This vulnerability allows network-adjacent attackers to disclose sensitive information on affected installations of D-Link G416 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the HTTP service listening on TCP port 80. The issue results from the lack of proper handling of error conditions. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of root. Was ZDI-CAN-21664.
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
D-Link G416 | ||
All of | ||
Dlink G416 Firmware | <1.09b01 | |
Dlink G416 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-50212 has been rated with a medium severity due to its potential to disclose sensitive information.
To fix CVE-2023-50212, it is recommended to update the firmware of the D-Link G416 router to the latest version provided by the vendor.
CVE-2023-50212 affects installations of D-Link G416 routers that are vulnerable to improper handling of exceptional conditions.
CVE-2023-50212 allows network-adjacent attackers to disclose sensitive information without the need for authentication.
No, authentication is not required to exploit CVE-2023-50212, making it easier for attackers to access sensitive information.