CVE-2024-13102 – D-Link DIR-816 Vulnerability – Remote DDNS Service Privilege Escalation

The following table lists the changes that have been made to the
CVE-2024-13102 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution
of a vulnerability, and for identifying the most recent changes that may
impact the vulnerability’s severity, exploitability, or other characteristics.

  • New CVE Received
    by [email protected]

    Jan. 02, 2025

    Action Type Old Value New Value
    Added Tag unsupported-when-assigned
    Added Description A vulnerability classified as critical was found in D-Link DIR-816 A2 1.10CNB05_R1B011D88210. This vulnerability affects unknown code of the file /goform/DDNS of the component DDNS Service. The manipulation leads to improper access controls. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
    Added CVSS V4.0 AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
    Added CVSS V3.1 AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
    Added CVSS V2 (AV:N/AC:L/Au:N/C:N/I:P/A:N)
    Added CWE CWE-284
    Added CWE CWE-266
    Added Reference https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Unauthorized_Vulnerability/D-Link/DIR-816/DDNS.md
    Added Reference https://vuldb.com/?ctiid.289918
    Added Reference https://vuldb.com/?id.289918
    Added Reference https://vuldb.com/?submit.472074
    Added Reference https://www.dlink.com/
Share the Post:

Related Posts