First published: Thu Jan 16 2025(Updated: )
An access control issue in the component form2PortriggerRule.cgi of D-Link 816A2_FWv1.10CNB05_R1B011D88210 allows unauthenticated attackers to set the port trigger of the device via a crafted POST request.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
D-Link 816A2 Firmware v1.10CNB05 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-57680 has been classified as a high severity access control vulnerability.
To mitigate CVE-2024-57680, update the D-Link 816A2 firmware to the latest version provided by the vendor.
CVE-2024-57680 affects the component form2PortriggerRule.cgi in the D-Link 816A2 firmware.
Devices running D-Link 816A2 firmware version v1.10CNB05 are vulnerable to CVE-2024-57680.
Attackers can exploit CVE-2024-57680 to set the port trigger of the device without authentication.