A vulnerability, which was classified as critical, was found in D-Link DI-7003GV2 24.04.18D1 R(68125). This affects the function sub_41F4F0 of the file /H5/webgl.asp?tggl_port=0&remote_management=0&http_passwd=game&exec_service=admin-restart. The manipulation leads to unverified password change. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
When setting a new password for a user, the product does not require knowledge of the original password, or using another form of authentication.
Link | Tags |
---|---|
https://vuldb.com/?id.309459 | third party advisory vdb entry technical description |
https://vuldb.com/?ctiid.309459 | permissions required vdb entry signature |
https://vuldb.com/?submit.578051 | vdb entry third party advisory |
https://github.com/at0de/my_vulns/blob/main/Dlink/Di-7003GV2/webgl_asp.md | exploit third party advisory |
https://www.dlink.com/ | product |