Vulnerability Details : CVE-2017-5633
Potential exploit
Multiple cross-site request forgery (CSRF) vulnerabilities on the D-Link DI-524 Wireless Router with firmware 9.01 allow remote attackers to (1) change the admin password, (2) reboot the device, or (3) possibly have unspecified other impact via crafted requests to CGI programs.
Vulnerability category: Cross-site request forgery (CSRF)
Products affected by CVE-2017-5633
- cpe:2.3:o:d-link:di-524_firmware:9.01:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2017-5633
1.85%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 81 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2017-5633
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
8.5
|
HIGH | AV:N/AC:M/Au:S/C:C/I:C/A:C |
6.8
|
10.0
|
NIST | |
8.0
|
HIGH | CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H |
2.1
|
5.9
|
NIST |
CWE ids for CVE-2017-5633
-
The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.Assigned by: nvd@nist.gov (Primary)
References for CVE-2017-5633
-
http://www.securityfocus.com/bid/96475
D-link DI-524 CVE-2017-5633 Multiple Cross Site Request Forgery VulnerabilitiesThird Party Advisory;VDB Entry
-
http://seclists.org/fulldisclosure/2017/Feb/70
Full Disclosure: D-link wireless router DI-524 – Multiple Cross-Site Request Forgery (CSRF) vulnerabilitiesExploit;Product;Third Party Advisory;VDB Entry
Jump to