Post-authenticated Denial of Service in D-Link Access Points
CVE-2019-14335
5.5MEDIUM
Summary
D-Link 6600-AP and DWL-3600AP devices are susceptible to a post-authenticated denial of service attack. Exploitation can be achieved through a specifically crafted request sent to the admin.cgi?action=%s URI. Successful exploitation leads to the unintentional reboot of the access points, disrupting service availability for users. This issue was present in firmware version 4.2.0.14, raised concerns regarding network integrity and reliability, making it essential for users to apply the necessary patches provided by D-Link.
References
CVSS V3.1
Score:
5.5
Severity:
MEDIUM
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved