First published: Mon Dec 30 2024(Updated: )
A vulnerability was found in D-Link DIR-823G 1.0.2B05_20181207. It has been rated as critical. This issue affects the function SetAutoRebootSettings/SetClientInfo/SetDMZSettings/SetFirewallSettings/SetParentsControlInfo/SetQoSSettings/SetVirtualServerSettings of the file /HNAP1/ of the component Web Management Interface. The manipulation leads to improper access controls. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
D-Link DIR-823 firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-13030 has been rated as critical.
CVE-2024-13030 affects the D-Link DIR-823G device.
To fix CVE-2024-13030, update your D-Link DIR-823G firmware to the latest version.
CVE-2024-13030 impacts the SetAutoRebootSettings, SetClientInfo, SetDMZSettings, SetFirewallSettings, SetParentsControlInfo, SetQoSSettings, and SetVirtualServerSettings functions.
Yes, CVE-2024-13030 can potentially be exploited remotely due to its nature.