ID

VAR-201902-0163


CVE

CVE-2019-7390


TITLE

D-Link DIR-823G Access Control Error Vulnerability

Trust: 1.2

sources: CNVD: CNVD-2019-30424 // CNNVD: CNNVD-201902-052

DESCRIPTION

An issue was discovered in /bin/goahead on D-Link DIR-823G devices with firmware 1.02B03. There is incorrect access control allowing remote attackers to hijack the DNS service configuration of all clients in the WLAN, without authentication, via the SetWanSettings HNAP API. D-Link DIR-823G There is an access control vulnerability in the device firmware.Information may be tampered with. D-Link DIR-823G is a wireless router from D-Link Corporation of Taiwan, China. D-Link DIR-823G Router is prone to a remote security vulnerability. An attacker can leverage this issue to perform unauthorized actions. This may aid in further attacks. D-Link DIR-823G with firmware 1.02B03 version is vulnerable; other versions may also be affected

Trust: 2.52

sources: NVD: CVE-2019-7390 // JVNDB: JVNDB-2019-001918 // CNVD: CNVD-2019-30424 // BID: 106855 // VULMON: CVE-2019-7390

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2019-30424

AFFECTED PRODUCTS

vendor:dlinkmodel:dir-823gscope:eqversion:1.02b03

Trust: 1.1

vendor:d linkmodel:dir-823g 1.02b03scope: - version: -

Trust: 0.9

vendor:d linkmodel:dir-823gscope:eqversion:1.02b03

Trust: 0.8

sources: CNVD: CNVD-2019-30424 // VULMON: CVE-2019-7390 // BID: 106855 // JVNDB: JVNDB-2019-001918 // NVD: CVE-2019-7390

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2019-7390
value: HIGH

Trust: 1.0

NVD: CVE-2019-7390
value: HIGH

Trust: 0.8

CNVD: CNVD-2019-30424
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201902-052
value: HIGH

Trust: 0.6

VULMON: CVE-2019-7390
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2019-7390
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

CNVD: CNVD-2019-30424
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2019-7390
baseSeverity: HIGH
baseScore: 8.6
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: CHANGED
confidentialityImpact: NONE
integrityImpact: HIGH
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 4.0
version: 3.0

Trust: 1.8

sources: CNVD: CNVD-2019-30424 // VULMON: CVE-2019-7390 // JVNDB: JVNDB-2019-001918 // CNNVD: CNNVD-201902-052 // NVD: CVE-2019-7390

PROBLEMTYPE DATA

problemtype:CWE-306

Trust: 1.0

problemtype:CWE-284

Trust: 0.8

sources: JVNDB: JVNDB-2019-001918 // NVD: CVE-2019-7390

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201902-052

TYPE

access control error

Trust: 0.6

sources: CNNVD: CNNVD-201902-052

CONFIGURATIONS

sources: JVNDB: JVNDB-2019-001918

PATCH

title:Top Pageurl:http://www.dlink.lt/en/

Trust: 0.8

title:D-Linkurl:https://github.com/leonW7/D-Link

Trust: 0.1

sources: VULMON: CVE-2019-7390 // JVNDB: JVNDB-2019-001918

EXTERNAL IDS

db:NVDid:CVE-2019-7390

Trust: 3.4

db:BIDid:106855

Trust: 2.6

db:JVNDBid:JVNDB-2019-001918

Trust: 0.8

db:CNVDid:CNVD-2019-30424

Trust: 0.6

db:CNNVDid:CNNVD-201902-052

Trust: 0.6

db:VULMONid:CVE-2019-7390

Trust: 0.1

sources: CNVD: CNVD-2019-30424 // VULMON: CVE-2019-7390 // BID: 106855 // JVNDB: JVNDB-2019-001918 // CNNVD: CNNVD-201902-052 // NVD: CVE-2019-7390

REFERENCES

url:https://github.com/leonw7/d-link/blob/master/vul_5.md

Trust: 2.8

url:http://www.securityfocus.com/bid/106855

Trust: 2.4

url:https://nvd.nist.gov/vuln/detail/cve-2019-7390

Trust: 2.0

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-7390

Trust: 0.8

url:http://www.dlink.com/

Trust: 0.3

url:http://www.dlink.com.cn/home/product?id=2960

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/284.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: CNVD: CNVD-2019-30424 // VULMON: CVE-2019-7390 // BID: 106855 // JVNDB: JVNDB-2019-001918 // CNNVD: CNNVD-201902-052 // NVD: CVE-2019-7390

CREDITS

David Chen

Trust: 0.9

sources: BID: 106855 // CNNVD: CNNVD-201902-052

SOURCES

db:CNVDid:CNVD-2019-30424
db:VULMONid:CVE-2019-7390
db:BIDid:106855
db:JVNDBid:JVNDB-2019-001918
db:CNNVDid:CNNVD-201902-052
db:NVDid:CVE-2019-7390

LAST UPDATE DATE

2024-11-23T22:30:08.785000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2019-30424date:2019-09-05T00:00:00
db:VULMONid:CVE-2019-7390date:2020-08-24T00:00:00
db:BIDid:106855date:2019-02-01T00:00:00
db:JVNDBid:JVNDB-2019-001918date:2019-03-29T00:00:00
db:CNNVDid:CNNVD-201902-052date:2020-08-25T00:00:00
db:NVDid:CVE-2019-7390date:2024-11-21T04:48:07.847

SOURCES RELEASE DATE

db:CNVDid:CNVD-2019-30424date:2019-08-30T00:00:00
db:VULMONid:CVE-2019-7390date:2019-02-05T00:00:00
db:BIDid:106855date:2019-02-01T00:00:00
db:JVNDBid:JVNDB-2019-001918date:2019-03-29T00:00:00
db:CNNVDid:CNNVD-201902-052date:2019-02-01T00:00:00
db:NVDid:CVE-2019-7390date:2019-02-05T00:29:00.367