Post-authenticated Denial of Service in D-Link Access Points
CVE-2019-14335

5.5MEDIUM

Key Information:

Vendor
D-Link
Vendor
CVE Published:
8 August 2019

Summary

D-Link 6600-AP and DWL-3600AP devices are susceptible to a post-authenticated denial of service attack. Exploitation can be achieved through a specifically crafted request sent to the admin.cgi?action=%s URI. Successful exploitation leads to the unintentional reboot of the access points, disrupting service availability for users. This issue was present in firmware version 4.2.0.14, raised concerns regarding network integrity and reliability, making it essential for users to apply the necessary patches provided by D-Link.

References

CVSS V3.1

Score:
5.5
Severity:
MEDIUM
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.