The D-Link DIR-816 A2 1.11 router only checks the random...
Critical severity
Unreviewed
Published
May 13, 2022
to the GitHub Advisory Database
•
Updated Feb 1, 2023
Description
Published by the National Vulnerability Database
Mar 25, 2019
Published to the GitHub Advisory Database
May 13, 2022
Last updated
Feb 1, 2023
The D-Link DIR-816 A2 1.11 router only checks the random token when authorizing a goform request. An attacker can get this token from dir_login.asp and use an API URL /goform/form2userconfig.cgi to edit the system account without authentication.
References