Access Control Issue in D-Link Router Allows Unauthenticated Network Configuration
CVE-2024-57676
Currently unrated
Summary
An access control flaw in D-Link's 816A2 firmware allows unauthenticated attackers to change the WLAN settings for both 2.4G and 5G networks. By sending a specially crafted POST request, attackers can manipulate crucial network configurations without needing any form of authentication. This vulnerability could potentially expose sensitive network environments to unauthorized access and attacks, making it essential for users to ensure their firmware is up to date and to implement additional security measures.
References
Timeline
Vulnerability published
Vulnerability Reserved