Vulnerability Description
D-Link DCS-936L devices with firmware before 1.05.07 have an inadequate CSRF protection mechanism that requires the device's IP address to be a substring of the HTTP Referer header.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| D-Link | Dcs-936L | < 1.05.07 |
| Dlink | Dcs-936L | - |
Related Weaknesses (CWE)
References
- ftp://ftp2.dlink.com/PRODUCTS/DCS-936L/REVA/BETA/DCS-936L_REVA_RELEASE_NOTES_v1.Issue TrackingRelease NotesVendor Advisory
- https://www.qualys.com/2017/03/26/qsa-2017-03-26/qsa-2017-03-26.pdfExploitIssue TrackingThird Party Advisory
- ftp://ftp2.dlink.com/PRODUCTS/DCS-936L/REVA/BETA/DCS-936L_REVA_RELEASE_NOTES_v1.Issue TrackingRelease NotesVendor Advisory
- https://www.qualys.com/2017/03/26/qsa-2017-03-26/qsa-2017-03-26.pdfExploitIssue TrackingThird Party Advisory
FAQ
What is CVE-2017-7851?
CVE-2017-7851 is a vulnerability with a CVSS score of 8.8 (HIGH). D-Link DCS-936L devices with firmware before 1.05.07 have an inadequate CSRF protection mechanism that requires the device's IP address to be a substring of the HTTP Referer header.
How severe is CVE-2017-7851?
CVE-2017-7851 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-7851?
Check the references section above for vendor advisories and patch information. Affected products include: D-Link Dcs-936L, Dlink Dcs-936L.