6.8
CVSSv2

CVE-2014-100005

Published: 13/01/2015 Updated: 18/05/2024
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
VMScore: 720
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

Multiple cross-site request forgery (CSRF) vulnerabilities in D-Link DIR-600 router (rev. Bx) with firmware prior to 2.17b02 allow remote malicious users to hijack the authentication of administrators for requests that (1) create an administrator account or (2) enable remote management via a crafted configuration module to hedwig.cgi, (3) activate new configuration settings via a SETCFG,SAVE,ACTIVATE action to pigwidgeon.cgi, or (4) send a ping via a ping action to diagnostic.php.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

dlink dir-600_firmware

dlink dir-600 -

Recent Articles

CISA warns of hackers exploiting Chrome, EoL D-Link bugs
BleepingComputer • Bill Toulas • 19 May 2024

CISA warns of hackers exploiting Chrome, EoL D-Link bugs By Bill Toulas May 19, 2024 10:17 AM 0 The U.S. Cybersecurity & Infrastructure Security Agency (CISA) has added three security vulnerabilities to its 'Known Exploited Vulnerabilities' catalog, one impacting Google Chrome and two affecting some D-Link routers. Adding the issues to the KEV catalog serves as a warning to federal agencies and companies that threat actors are leveraging them in attacks and security updates or miti...