Vulnerability Description
D-Link DIR-615 HW: T1 FW:20.09 is vulnerable to Cross-Site Request Forgery (CSRF) vulnerability. This enables an attacker to perform an unwanted action on a wireless router for which the user/admin is currently authenticated, as demonstrated by changing the Security option from WPA2 to None, or changing the hiddenSSID parameter, SSID parameter, or a security-option password.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| D-Link | Dir-615 Firmware | 20.09 |
| Dlink | Dir-615 | - |
Related Weaknesses (CWE)
References
- http://seclists.org/fulldisclosure/2017/Apr/4Third Party AdvisoryVDB Entry
- https://www.exploit-db.com/exploits/41821/
- http://seclists.org/fulldisclosure/2017/Apr/4Third Party AdvisoryVDB Entry
- https://www.exploit-db.com/exploits/41821/
FAQ
What is CVE-2017-7398?
CVE-2017-7398 is a vulnerability with a CVSS score of 8.8 (HIGH). D-Link DIR-615 HW: T1 FW:20.09 is vulnerable to Cross-Site Request Forgery (CSRF) vulnerability. This enables an attacker to perform an unwanted action on a wireless router for which the user/admin is...
How severe is CVE-2017-7398?
CVE-2017-7398 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-7398?
Check the references section above for vendor advisories and patch information. Affected products include: D-Link Dir-615 Firmware, Dlink Dir-615.