D-Link DIR-816 A2 1.10 B05 allows unauthenticated attackers to arbitrarily reset the device via a crafted tokenid parameter to /goform/form2Reboot.cgi.
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Link | Tags |
---|---|
https://www.dlink.com/en/security-bulletin/ | vendor advisory |
https://github.com/GD008/vuln/blob/main/DIR-816_reset.md | third party advisory exploit |
https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10240 | vendor advisory |