First published: Tue Feb 18 2025(Updated: )
A vulnerability in the D-Link DIR-859 router with firmware version A3 1.05 and earlier permits unauthorized individuals to bypass the authentication. An attacker can obtain a user name and password by forging a post request to the / getcfg.php page.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
D-Link DIR-859 A1 | <=A3 1.05 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-57045 is classified as a high severity vulnerability due to the potential for unauthorized access to user credentials.
To fix CVE-2024-57045, update the D-Link DIR-859 router firmware to a version later than A3 1.05.
CVE-2024-57045 enables an attacker to bypass authentication and obtain user credentials through a forged POST request.
All D-Link DIR-859 routers operating on firmware version A3 1.05 and earlier are affected by CVE-2024-57045.
Attackers exploiting CVE-2024-57045 can obtain valid usernames and passwords from the affected router's configuration.