Vulnerability Description
An issue was discovered in /bin/goahead on D-Link DIR-823G devices with the firmware 1.02B03. There is incorrect access control allowing remote attackers to reset the router without authentication via the SetFactoryDefault HNAP API. Consequently, an attacker can achieve a denial-of-service attack without authentication.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Dlink | Dir-823G Firmware | 1.02b03 |
| Dlink | Dir-823G | - |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/bid/106853Third Party Advisory
- https://github.com/leonW7/D-Link/blob/master/Vul_4.mdExploitThird Party Advisory
- http://www.securityfocus.com/bid/106853Third Party Advisory
- https://github.com/leonW7/D-Link/blob/master/Vul_4.mdExploitThird Party Advisory
FAQ
What is CVE-2019-7389?
CVE-2019-7389 is a vulnerability with a CVSS score of 7.5 (HIGH). An issue was discovered in /bin/goahead on D-Link DIR-823G devices with the firmware 1.02B03. There is incorrect access control allowing remote attackers to reset the router without authentication via...
How severe is CVE-2019-7389?
CVE-2019-7389 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-7389?
Check the references section above for vendor advisories and patch information. Affected products include: Dlink Dir-823G Firmware, Dlink Dir-823G.