Vulnerability Description
D-Link DAP-1860 devices before v1.04b03 Beta allow access to administrator functions without authentication via the HNAP_AUTH header timestamp value. In HTTP requests, part of the HNAP_AUTH header is the timestamp used to determine the time when the user sent the request. If this value is equal to the value stored in the device's /var/hnap/timestamp file, the request will pass the HNAP_AUTH check function.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Dlink | Dap-1860 Firmware | 1.01b06 |
| Dlink | Dap-1860 | - |
Related Weaknesses (CWE)
References
- https://chung96vn.wordpress.com/2019/11/15/d-link-dap-1860-vulnerabilities/ExploitThird Party Advisory
- https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP1Third Party Advisory
- https://chung96vn.wordpress.com/2019/11/15/d-link-dap-1860-vulnerabilities/ExploitThird Party Advisory
- https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP1Third Party Advisory
FAQ
What is CVE-2019-19598?
CVE-2019-19598 is a vulnerability with a CVSS score of 8.8 (HIGH). D-Link DAP-1860 devices before v1.04b03 Beta allow access to administrator functions without authentication via the HNAP_AUTH header timestamp value. In HTTP requests, part of the HNAP_AUTH header is ...
How severe is CVE-2019-19598?
CVE-2019-19598 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-19598?
Check the references section above for vendor advisories and patch information. Affected products include: Dlink Dap-1860 Firmware, Dlink Dap-1860.