CVE-2019-6961
Summary
| CVE | CVE-2019-6961 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2019-06-20 14:15:00 UTC |
| Updated | 2020-08-24 17:37:00 UTC |
| Description | Incorrect access control in actionHandlerUtility.php in the RDK RDKB-20181217-1 WebUI module allows a logged in user to control DDNS, QoS, RIP, and other privileged configurations (intended only for the network operator) by sending an HTTP POST to the PHP backend, because the page filtering for non-superuser (in header.php) is done only for GET requests and not for direct AJAX calls. |
Risk And Classification
Problem Types: CWE-862
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Rdkcentral | Rdkb Ccsppandm | rdkb-20181217-1 | All | All | All |
| Application | Rdkcentral | Rdkb Ccsppandm | rdkb-20181217-1 | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| BullGuard 2021 | Antivirus and VPN for your home and business | MISC | dojo.bullguard.com | Third Party Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.