First published: Thu Jan 16 2025(Updated: )
An access control issue in the component form2WlAc.cgi of D-Link 816A2_FWv1.10CNB05_R1B011D88210 allows unauthenticated attackers to set the 2.4G and 5G mac access control list of the device via a crafted POST request.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
D-Link DIR-816 A2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-57678 is classified as a high severity vulnerability due to its potential to allow unauthenticated attackers to manipulate access controls.
Fixing CVE-2024-57678 involves updating the D-Link 816A2 firmware to the latest version provided by D-Link.
CVE-2024-57678 affects the form2WlAc.cgi component of the D-Link 816A2 device.
Users of the D-Link 816A2 router with the specified firmware version are vulnerable to CVE-2024-57678.
An attacker can potentially set the MAC access control list for both the 2.4G and 5G networks of the device through a crafted POST request.