PT-2025-2001 · D Link · D-Link Dir-816 A2

Yhryhryhr

·

Published

2024-12-30

·

Updated

2025-05-02

·

CVE-2024-13102

CVSS v4.0
6.9
VectorAV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N

Name of the Vulnerable Software and Affected Versions:

D-Link DIR-816 A2 version 1.10CNB05 R1B011D88210

Description:

A critical issue affects the unknown code of the file /goform/DDNS of the DDNS Service component, leading to improper access controls. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.

Recommendations:

For D-Link DIR-816 A2 version 1.10CNB05 R1B011D88210, as a temporary workaround, consider disabling the access to the /goform/DDNS file until a patch is available. Restrict access to the DDNS Service component to minimize the risk of exploitation. Avoid using the DDNS Service until the issue is resolved. At the moment, there is no information about a newer version that contains a fix for this issue.

Exploit

Fix

Incorrect Privilege Assignment

Improper Access Control

Weakness Enumeration

Related Identifiers

BDU:2025-02174
CVE-2024-13102

Affected Products

D-Link Dir-816 A2