CVE-2017-5633
Published Mar 6, 2017
Last updated 2 years ago
Overview
- Description
- Multiple cross-site request forgery (CSRF) vulnerabilities on the D-Link DI-524 Wireless Router with firmware 9.01 allow remote attackers to (1) change the admin password, (2) reboot the device, or (3) possibly have unspecified other impact via crafted requests to CGI programs.
- Source
- cve@mitre.org
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 3.0
- Type
- Primary
- Base score
- 8
- Impact score
- 5.9
- Exploitability score
- 2.1
- Vector string
- CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
- Severity
- HIGH
CVSS 2.0
- Type
- Primary
- Base score
- 8.5
- Impact score
- 10
- Exploitability score
- 6.8
- Vector string
- AV:N/AC:M/Au:S/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- CWE-352
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:d-link:di-524_firmware:9.01:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B45F1E5E-479E-4FBF-9EF8-26B6A77AAD18" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:dlink:di-524:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "C2AA1B80-0CBA-4AFC-8F55-71B3C26CFA88" } ], "operator": "OR" } ], "operator": "AND" } ]