Lucene search

K
cve[email protected]CVE-2023-50199
HistoryMay 03, 2024 - 3:16 a.m.

CVE-2023-50199

2024-05-0303:16:05
CWE-306
web.nvd.nist.gov
29
d-link g416
httpd
authentication bypass
tcp port 80
remote code execution
critical function
vulnerability
zdi-can-21287

8.8 High

CVSS3

Attack Vector

ADJACENT

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.3 High

AI Score

Confidence

High

0.0005 Low

EPSS

Percentile

16.4%

D-Link G416 httpd Missing Authentication for Critical Function Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of D-Link G416 routers. Authentication is not required to exploit this vulnerability.

The specific flaw exists within the HTTP service listening on TCP port 80. The issue results from the lack of authentication prior to allowing access to functionality. An attacker can leverage this vulnerability to gain access to critical functions on the device. Was ZDI-CAN-21287.

Affected configurations

Vulners
Node
d-linkdsl6740u_firmwareRange1.08

CNA Affected

[
  {
    "vendor": "D-Link",
    "product": "G416",
    "versions": [
      {
        "version": "1.08b02",
        "status": "affected"
      }
    ],
    "defaultStatus": "unknown"
  }
]

8.8 High

CVSS3

Attack Vector

ADJACENT

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.3 High

AI Score

Confidence

High

0.0005 Low

EPSS

Percentile

16.4%

Related for CVE-2023-50199