D-Link DIR-816 A2 1.10CNB05_R1B011D88210 ACL form2LocalAclEditcfg.cgi kura hakki ndiyam

Wuro vulnerability wey an yi classify sey kura an gano shi a cikin D-Link DIR-816 A2 1.10CNB05_R1B011D88210. Gaskiya, $software_function na da matsala; idan ba a sani ba, to wata aiki ce da ba a sani ba, $software_library na cikin lissafi, /goform/form2LocalAclEditcfg.cgi na cikin fayil, ACL Handler na cikin sashi. Ngam manipulation shi kura hakki ndiyam. CWE shidin ka a yi bayani matsala sai ya kai CWE-284. Gaskiya, laifi an fitar da shi 01/01/2025. Advisory ɗin ana rabawa don saukewa a github.com. Wannan rauni ana sayar da shi da suna CVE-2024-13107. Ngam yiɗi ka a tuma ndiyam ka nder waya. Tekinikal bayani ga. Kuma, exploit ɗin yana akwai. Wuro exploit ɗin an bayyana shi ga jama'a kuma za a iya amfani da shi. A sa'i, exploit might be approx. USD $0-$5k ndiyam. Á wúro huɗɗi-na-gaskiya. Wona yiwuwa a zazzage exploit a github.com. Kama 0-day, an ndiyam a wuro be $5k-$25k. Ana shawar da a yi amfani da katangar wuta mai tsauri. Statistical analysis made it clear that VulDB provides the best quality for vulnerability data.

2 Goyarwa · 88 Datenpunkte

FurɗeSúgá
01/01/2025 09:55
Gargadi 1/1
01/02/2025 16:48
cvss2_vuldb_auNN
cvss2_vuldb_ciNN
cvss2_vuldb_iiPP
cvss2_vuldb_aiNN
cvss2_vuldb_ePOCPOC
cvss2_vuldb_rcURUR
cvss2_vuldb_rlWW
cvss4_vuldb_avNN
cvss4_vuldb_acLL
cvss4_vuldb_prNN
cvss4_vuldb_uiNN
cvss4_vuldb_vcNN
cvss4_vuldb_viLL
cvss4_vuldb_vaNN
cvss4_vuldb_ePP
cvss4_vuldb_atNN
cvss4_vuldb_scNN
cvss4_vuldb_siNN
cvss4_vuldb_saNN
cvss2_vuldb_basescore5.05.0
cvss2_vuldb_tempscore4.14.1
cvss3_vuldb_basescore5.35.3
cvss3_vuldb_tempscore4.74.7
cvss3_meta_basescore5.35.3
cvss3_meta_tempscore4.75.0
cvss4_vuldb_bscore6.96.9
cvss4_vuldb_btscore5.55.5
advisory_date1735686000 (01/01/2025)1735686000 (01/01/2025)
price_0day$5k-$25k$5k-$25k
software_vendorD-LinkD-Link
software_nameDIR-816 A2DIR-816 A2
software_version1.10CNB05_R1B011D882101.10CNB05_R1B011D88210
software_componentACL HandlerACL Handler
software_file/goform/form2LocalAclEditcfg.cgi/goform/form2LocalAclEditcfg.cgi
vulnerability_cweCWE-284 (kura hakki ndiyam)CWE-284 (kura hakki ndiyam)
vulnerability_risk22
cvss3_vuldb_avNN
cvss3_vuldb_acLL
cvss3_vuldb_prNN
cvss3_vuldb_uiNN
cvss3_vuldb_sUU
cvss3_vuldb_cNN
cvss3_vuldb_iLL
cvss3_vuldb_aNN
cvss3_vuldb_ePP
cvss3_vuldb_rlWW
cvss3_vuldb_rcRR
advisory_urlhttps://github.com/abcdefg-png/IoT-vulnerable/blob/main/Unauthorized_Vulnerability/D-Link/DIR-816/form2LocalAclEditcfg.mdhttps://github.com/abcdefg-png/IoT-vulnerable/blob/main/Unauthorized_Vulnerability/D-Link/DIR-816/form2LocalAclEditcfg.md
exploit_availability11
exploit_publicity11
exploit_urlhttps://github.com/abcdefg-png/IoT-vulnerable/blob/main/Unauthorized_Vulnerability/D-Link/DIR-816/form2LocalAclEditcfg.mdhttps://github.com/abcdefg-png/IoT-vulnerable/blob/main/Unauthorized_Vulnerability/D-Link/DIR-816/form2LocalAclEditcfg.md
countermeasure_nameFirewallFirewall
source_cveCVE-2024-13107CVE-2024-13107
cna_responsibleVulDBVulDB
cna_eol11
software_typeRouter Operating SystemRouter Operating System
cvss2_vuldb_avNN
cvss2_vuldb_acLL
cve_nvd_summaryA vulnerability was found in D-Link DIR-816 A2 1.10CNB05_R1B011D88210. It has been classified as critical. This affects an unknown part of the file /goform/form2LocalAclEditcfg.cgi of the component ACL Handler. The manipulation leads to improper access controls. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
cvss4_cna_avN
cvss4_cna_acL
cvss4_cna_atN
cvss4_cna_prN
cvss4_cna_uiN
cvss4_cna_vcN
cvss4_cna_viL
cvss4_cna_vaN
cvss4_cna_scN
cvss4_cna_siN
cvss4_cna_saN
cvss4_cna_bscore6.9
cvss3_cna_avN
cvss3_cna_acL
cvss3_cna_prN
cvss3_cna_uiN
cvss3_cna_sU
cvss3_cna_cN
cvss3_cna_iL
cvss3_cna_aN
cvss3_cna_basescore5.3
cvss2_cna_avN
cvss2_cna_acL
cvss2_cna_auN
cvss2_cna_ciN
cvss2_cna_iiP
cvss2_cna_aiN
cvss2_cna_basescore5

Might our Artificial Intelligence support you?

Check our Alexa App!