CISA KEV 정보
| 취약점명 | D-Link DIR-600 Router Cross-Site Request Forgery (CSRF) Vulnerability |
|---|---|
| 설명 | D-Link DIR-600 routers contain a cross-site request forgery (CSRF) vulnerability that allows an attacker to change router configurations by hijacking an existing administrator session. |
| 조치사항 | This vulnerability affects legacy D-Link products. All associated hardware revisions have reached their end-of-life (EOL) or end-of-service (EOS) life cycle and should be retired and replaced per vendor instructions. |
| 랜섬웨어 캠페인 악용 | Unknown |
| CWE | CWE-352 |
| 등록일 (KEV) | 2024-05-16 |
| 조치 기한 | 2024-06-06 |
| 추가 참고 | https://legacy.us.dlink.com/pages/product.aspx?id=4587b63118524aec911191cc81605283; https://nvd.nist.gov/vuln/detail/CVE-2014-100005 |
NVD 상세 정보
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HAV:N/AC:M/Au:N/C:P/I:P/A:P설명: Multiple cross-site request forgery (CSRF) vulnerabilities in D-Link DIR-600 router (rev. Bx) with firmware before 2.17b02 allow remote attackers to hijack the authentication of administrators for requests that (1) create an administrator account or (2) enable remote management via a crafted configuration module to hedwig.cgi, (3) activate new configuration settings via a SETCFG,SAVE,ACTIVATE action to pigwidgeon.cgi, or (4) send a ping via a ping action to diagnostic.php.
CWE: CWE-352 | CWE-352
참조
- http://resources.infosecinstitute.com/csrf-unauthorized-remote-admin-access/ [Exploit, Third Party Advisory]
- http://secunia.com/advisories/57304 [Broken Link]
- http://securityadvisories.dlink.com/security/publication.aspx?name=SAP10018 [Patch, Vendor Advisory]
- https://exchange.xforce.ibmcloud.com/vulnerabilities/91794 [Third Party Advisory, VDB Entry]
- http://resources.infosecinstitute.com/csrf-unauthorized-remote-admin-access/ [Exploit, Third Party Advisory]
- http://secunia.com/advisories/57304 [Broken Link]
- http://securityadvisories.dlink.com/security/publication.aspx?name=SAP10018 [Patch, Vendor Advisory]
- https://exchange.xforce.ibmcloud.com/vulnerabilities/91794 [Third Party Advisory, VDB Entry]
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2014-100005
This product uses the NVD API but is not endorsed or certified by the NVD.