First published: Thu Jan 16 2025(Updated: )
An access control issue in the component form2RepeaterSetup.cgi of D-Link 816A2_FWv1.10CNB05_R1B011D88210 allows unauthenticated attackers to set the 2.4G and 5G repeater service of the device via a crafted POST request.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
D-Link DIR-816A2 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-57679 is categorized as a high severity access control vulnerability that allows unauthenticated attackers to compromise the device.
To fix CVE-2024-57679, update the D-Link 816A2 firmware to the latest version provided by D-Link.
Exploiting CVE-2024-57679 enables attackers to alter the 2.4G and 5G repeater settings, potentially impacting network security.
CVE-2024-57679 affects users of the D-Link 816A2 firmware v1.10CNB05_R1B011D88210.
You can determine if your device is vulnerable to CVE-2024-57679 by checking its firmware version against the affected versions listed by D-Link.