Improper Access Controls in D-Link DIR-823G Web Management Interface
CVE-2024-13030

6.9MEDIUM

Key Information:

Vendor
D-link
Status
Vendor
CVE Published:
30 December 2024

Summary

The D-Link DIR-823G router has a vulnerability within its web management interface, specifically concerning multiple settings functions, including SetAutoRebootSettings, SetClientInfo, SetDMZSettings, SetFirewallSettings, SetParentsControlInfo, SetQoSSettings, and SetVirtualServerSettings. This vulnerability arises due to improper access controls in the /HNAP1/ component, enabling remote attackers to exploit the flaw without local access. A successful attack may allow unauthorized manipulation of critical network settings, potentially compromising the integrity and security of the network.

Affected Version(s)

DIR-823G 1.0.2B05_20181207

References

CVSS V4

Score:
6.9
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

Credit

wxhwxhwxh_mie (VulDB User)
.