Vulnerability Description
An issue was discovered on D-Link DIR-823G devices with firmware 1.02B03. There is incorrect access control allowing remote attackers to enable Guest Wi-Fi via the SetWLanRadioSettings HNAP API to the web service provided by /bin/goahead.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Dlink | Dir-823G Firmware | 1.02b03 |
| Dlink | Dir-823G | - |
References
- https://github.com/leonW7/D-Link/blob/master/Vul_6.mdExploitThird Party Advisory
- https://github.com/leonW7/D-Link/blob/master/Vul_6.mdExploitThird Party Advisory
FAQ
What is CVE-2019-8392?
CVE-2019-8392 is a vulnerability with a CVSS score of 7.5 (HIGH). An issue was discovered on D-Link DIR-823G devices with firmware 1.02B03. There is incorrect access control allowing remote attackers to enable Guest Wi-Fi via the SetWLanRadioSettings HNAP API to the...
How severe is CVE-2019-8392?
CVE-2019-8392 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-8392?
Check the references section above for vendor advisories and patch information. Affected products include: Dlink Dir-823G Firmware, Dlink Dir-823G.