CVE-2014-100005
KEV
🔴 Łataj teraz
Wielokrotne luki CSRF w routerze D-Link DIR-600 umożliwiają przejęcie sesji administratora.
CVSS
8.0
EPSS
40.8%
Exploit
weaponized
Vendor
dlink
Opis źródłowy (NVD)
Multiple cross-site request forgery (CSRF) vulnerabilities in D-Link DIR-600 router (rev. Bx) with firmware before 2.17b02 allow remote attackers to hijack the authentication of administrators for requests that (1) create an administrator account or (2) enable remote management via a crafted configuration module to hedwig.cgi, (3) activate new configuration settings via a SETCFG,SAVE,ACTIVATE action to pigwidgeon.cgi, or (4) send a ping via a ping action to diagnostic.php.
exploit
Brak patcha
Źródła i daty
| Źródło | Wartość |
|---|---|
| NVD – CVSS | 8.0 |
| CISA KEV (aktywnie wykorzystywane) | Tak |
| FIRST EPSS (prawdopodobieństwo exploita) | 40.8% |
| Opublikowano (NVD) | 2015-01-13 11:59:04 UTC |
| Ostatnia modyfikacja (NVD) | 2026-04-22 13:57:50 UTC |
Referencje
- http://resources.infosecinstitute.com/csrf-unauthorized-remote-admin-access/ (cve@mitre.org) [Exploit, Third Party Advisory]
- http://secunia.com/advisories/57304 (cve@mitre.org) [Broken Link]
- http://securityadvisories.dlink.com/security/publication.aspx?name=SAP10018 (cve@mitre.org) [Patch, Vendor Advisory]
- https://exchange.xforce.ibmcloud.com/vulnerabilities/91794 (cve@mitre.org) [Third Party Advisory, VDB Entry]
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2014-100005 (134c704f-9b21-4f2e-91b3-4a467353bcc0) [US Government Resource]