vendor:
D-Link DI-524 Wireless 150
by:
Felipe Soares de Souza
7.5
CVSS
HIGH
Cross-Site-Request-Forgery
352
CWE
Product Name: D-Link DI-524 Wireless 150
Affected Version From: Firmware 9.01
Affected Version To:
Patch Exists: NO
Related CWE:
CPE: h:d-link:di-524
Platforms Tested:
2016
D-Link DI-524 – Cross-Site-Request-Forgery Vulnerability
This vulnerability allows an attacker to perform unauthorized actions on the D-Link DI-524 Wireless 150 router. The exploit consists of two parts: one to reboot the device and another to change the admin account. The first part sends a request to the router's web interface to reboot it, while the second part changes the admin account credentials without the user's consent.
Mitigation:
To mitigate this vulnerability, users should ensure they are running the latest firmware version (9.01) provided by D-Link. It is also recommended to change the default admin credentials and regularly monitor the router's logs for any suspicious activity.