D-Link DIR-605 Broadband Router Cross Site Request Forgery Vulnerability
BID:52682
Info
D-Link DIR-605 Broadband Router Cross Site Request Forgery Vulnerability
| Bugtraq ID: | 52682 |
| Class: | Design Error |
| CVE: | |
| Remote: | Yes |
| Local: | No |
| Published: | Mar 21 2012 12:00AM |
| Updated: | Mar 21 2012 12:00AM |
| Credit: | iqzer0++ |
| Vulnerable: |
D-Link DIR-605 0 |
| Not Vulnerable: | |
Discussion
D-Link DIR-605 Broadband Router Cross Site Request Forgery Vulnerability
D-Link DIR-605 broadband router is prone to a cross-site request-forgery vulnerability.
Exploiting this issue may allow a remote attacker to change a device's configuration and perform other unauthorized actions.
D-Link DIR-605 running firmware 2.00 is vulnerable. Additional models and firmware versions may also be affected.
D-Link DIR-605 broadband router is prone to a cross-site request-forgery vulnerability.
Exploiting this issue may allow a remote attacker to change a device's configuration and perform other unauthorized actions.
D-Link DIR-605 running firmware 2.00 is vulnerable. Additional models and firmware versions may also be affected.
Exploit / POC
D-Link DIR-605 Broadband Router Cross Site Request Forgery Vulnerability
To exploit this issue, an attacker must entice an unsuspecting victim into following a malicious URI.
To exploit this issue, an attacker must entice an unsuspecting victim into following a malicious URI.
Solution / Fix
D-Link DIR-605 Broadband Router Cross Site Request Forgery Vulnerability
Solution:
Currently we are not aware of any vendor-supplied patches. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
Solution:
Currently we are not aware of any vendor-supplied patches. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
References
D-Link DIR-605 Broadband Router Cross Site Request Forgery Vulnerability
References:
References:
- D-Link Homepage (D-Link)
- DIR-605 Homepage (D-Link)