Vulnerability Description
A vulnerability was found in D-Link DIR-823G 1.0.2B05_20181207. It has been rated as critical. This issue affects the function SetAutoRebootSettings/SetClientInfo/SetDMZSettings/SetFirewallSettings/SetParentsControlInfo/SetQoSSettings/SetVirtualServerSettings of the file /HNAP1/ of the component Web Management Interface. The manipulation leads to improper access controls. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Dlink | Dir-823G Firmware | 1.0.2b05_20181207 |
| Dlink | Dir-823G | - |
Related Weaknesses (CWE)
References
- https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Unauthorized_VulnerabiliBroken Link
- https://vuldb.com/?ctiid.289763Permissions RequiredVDB Entry
- https://vuldb.com/?id.289763Third Party AdvisoryVDB Entry
- https://vuldb.com/?submit.467903Third Party AdvisoryVDB Entry
- https://www.dlink.com.cn/about/article/news?id=2247Product
- https://www.dlink.com/Product
FAQ
What is CVE-2024-13030?
CVE-2024-13030 is a vulnerability with a CVSS score of 7.3 (HIGH). A vulnerability was found in D-Link DIR-823G 1.0.2B05_20181207. It has been rated as critical. This issue affects the function SetAutoRebootSettings/SetClientInfo/SetDMZSettings/SetFirewallSettings/Se...
How severe is CVE-2024-13030?
CVE-2024-13030 has been rated HIGH with a CVSS base score of 7.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-13030?
Check the references section above for vendor advisories and patch information. Affected products include: Dlink Dir-823G Firmware, Dlink Dir-823G.