Vulnerability Description
Multiple cross-site request forgery (CSRF) vulnerabilities on the D-Link DI-524 Wireless Router with firmware 9.01 allow remote attackers to (1) change the admin password, (2) reboot the device, or (3) possibly have unspecified other impact via crafted requests to CGI programs.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| D-Link | Di-524 Firmware | 9.01 |
| Dlink | Di-524 | - |
Related Weaknesses (CWE)
References
- http://seclists.org/fulldisclosure/2017/Feb/70ExploitProductThird Party Advisory
- http://www.securityfocus.com/bid/96475Third Party AdvisoryVDB Entry
- http://seclists.org/fulldisclosure/2017/Feb/70ExploitProductThird Party Advisory
- http://www.securityfocus.com/bid/96475Third Party AdvisoryVDB Entry
FAQ
What is CVE-2017-5633?
CVE-2017-5633 is a vulnerability with a CVSS score of 8.0 (HIGH). Multiple cross-site request forgery (CSRF) vulnerabilities on the D-Link DI-524 Wireless Router with firmware 9.01 allow remote attackers to (1) change the admin password, (2) reboot the device, or (3...
How severe is CVE-2017-5633?
CVE-2017-5633 has been rated HIGH with a CVSS base score of 8.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-5633?
Check the references section above for vendor advisories and patch information. Affected products include: D-Link Di-524 Firmware, Dlink Di-524.