Vulnerability Details : CVE-2019-7390
Potential exploit
An issue was discovered in /bin/goahead on D-Link DIR-823G devices with firmware 1.02B03. There is incorrect access control allowing remote attackers to hijack the DNS service configuration of all clients in the WLAN, without authentication, via the SetWanSettings HNAP API.
Products affected by CVE-2019-7390
- cpe:2.3:o:dlink:dir-823g_firmware:1.02b03:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2019-7390
1.02%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 76 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2019-7390
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:P/A:N |
10.0
|
2.9
|
NIST | |
8.6
|
HIGH | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N |
3.9
|
4.0
|
NIST |
CWE ids for CVE-2019-7390
-
The product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources.Assigned by: nvd@nist.gov (Primary)
References for CVE-2019-7390
-
http://www.securityfocus.com/bid/106855
D-Link DIR-823G Router CVE-2019-7390 Remote Security VulnerabilityThird Party Advisory
-
https://github.com/leonW7/D-Link/blob/master/Vul_5.md
D-Link/Vul_5.md at master · leonW7/D-Link · GitHubExploit;Third Party Advisory
Jump to