First published: Thu Jan 02 2025(Updated: )
A vulnerability classified as critical was found in D-Link DIR-816 A2 1.10CNB05_R1B011D88210. This vulnerability affects unknown code of the file /goform/DDNS of the component DDNS Service. The manipulation leads to improper access controls. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
D-Link DIR-816 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-13102 is classified as a critical vulnerability.
CVE-2024-13102 affects the DDNS Service component of the D-Link DIR-816 A2 router.
An attacker can exploit CVE-2024-13102 by remotely manipulating improper access controls in the DDNS service.
Currently, there is no specific publicly available fix for CVE-2024-13102.
To mitigate CVE-2024-13102, consider disabling the DDNS feature or restricting access to the router's management interface.