Vulnerability Description
An issue was discovered in /bin/goahead on D-Link DIR-823G devices with firmware 1.02B03. There is incorrect access control allowing remote attackers to hijack the DNS service configuration of all clients in the WLAN, without authentication, via the SetWanSettings HNAP API.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Dlink | Dir-823G Firmware | 1.02b03 |
| Dlink | Dir-823G | - |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/bid/106855Third Party Advisory
- https://github.com/leonW7/D-Link/blob/master/Vul_5.mdExploitThird Party Advisory
- http://www.securityfocus.com/bid/106855Third Party Advisory
- https://github.com/leonW7/D-Link/blob/master/Vul_5.mdExploitThird Party Advisory
FAQ
What is CVE-2019-7390?
CVE-2019-7390 is a vulnerability with a CVSS score of 8.6 (HIGH). An issue was discovered in /bin/goahead on D-Link DIR-823G devices with firmware 1.02B03. There is incorrect access control allowing remote attackers to hijack the DNS service configuration of all cli...
How severe is CVE-2019-7390?
CVE-2019-7390 has been rated HIGH with a CVSS base score of 8.6/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-7390?
Check the references section above for vendor advisories and patch information. Affected products include: Dlink Dir-823G Firmware, Dlink Dir-823G.