First published: Thu Jan 16 2025(Updated: )
An access control issue in the component form2WlanBasicSetup.cgi of D-Link 816A2_FWv1.10CNB05_R1B011D88210 allows unauthenticated attackers to set the 2.4G and 5G wlan service of the device via a crafted POST request.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
D-Link 816A2 Firmware v1.10CNB05 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-57676 is classified as a high-severity vulnerability due to its potential to allow unauthenticated access to critical device settings.
To fix CVE-2024-57676, it's recommended to update the D-Link 816A2 firmware to the latest version released by the vendor.
CVE-2024-57676 affects devices running D-Link 816A2 Firmware v1.10CNB05.
Exploiting CVE-2024-57676 allows attackers to manipulate the WLAN settings by sending a crafted POST request.
Yes, CVE-2024-57676 is remotely exploitable, allowing attackers to access the device's configurations without authentication.