Vulnerability Description
An issue was discovered on D-Link DSL-2888A devices with firmware prior to AU_2.31_V1.1.47ae55. Lack of authentication functionality allows an attacker to assign a static IP address that was once used by a valid user.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Dlink | Dsl2888A Firmware | < au_2.31_v1.1.47ae55 |
| Dlink | Dsl2888A | - |
Related Weaknesses (CWE)
References
- https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/d-link-multiple-ExploitThird Party Advisory
- https://www.trustwave.com/en-us/resources/security-resources/security-advisoriesThird Party Advisory
- https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/d-link-multiple-ExploitThird Party Advisory
- https://www.trustwave.com/en-us/resources/security-resources/security-advisoriesThird Party Advisory
FAQ
What is CVE-2020-24580?
CVE-2020-24580 is a vulnerability with a CVSS score of 7.5 (HIGH). An issue was discovered on D-Link DSL-2888A devices with firmware prior to AU_2.31_V1.1.47ae55. Lack of authentication functionality allows an attacker to assign a static IP address that was once used...
How severe is CVE-2020-24580?
CVE-2020-24580 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-24580?
Check the references section above for vendor advisories and patch information. Affected products include: Dlink Dsl2888A Firmware, Dlink Dsl2888A.