Lucene search

K
cve[email protected]CVE-2019-7390
HistoryFeb 05, 2019 - 12:29 a.m.

CVE-2019-7390

2019-02-0500:29:00
CWE-306
web.nvd.nist.gov
23
cve-2019-7390
d-link
dir-823g
firmware
access control
remote attack
dns hijacking
authentication
setwansettings
hnap api
nvd

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

8.6 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N

8.5 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

53.4%

An issue was discovered in /bin/goahead on D-Link DIR-823G devices with firmware 1.02B03. There is incorrect access control allowing remote attackers to hijack the DNS service configuration of all clients in the WLAN, without authentication, via the SetWanSettings HNAP API.

Affected configurations

NVD
Node
dlinkdir-823g_firmwareMatch1.02b03
AND
dlinkdir-823gMatch-

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

8.6 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N

8.5 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

53.4%

Related for CVE-2019-7390