Published on July 11th, 2019 📆 | 5890 Views ⚑
0D-Link DIR-655 C up to 3.02B05 BETA02 apply_sec.cgi setup_wizard privilege escalation
CVSS Meta Temp Score | Current Exploit Price (β) |
---|---|
6.0 | $0-$5k |
A vulnerability, which was classified as critical, has been found in D-Link DIR-655 C up to 3.02B05 BETA02 (Router Operating System). This issue affects an unknown code of the file apply_sec.cgi. The manipulation of the argument setup_wizard
as part of a Parameter leads to a privilege escalation vulnerability (Blank). Using CWE to declare the problem leads to CWE-269. Impacted is confidentiality, integrity, and availability.
The weakness was shared 07/11/2019. The identification of this vulnerability is CVE-2019-13560 since 07/11/2019. The attack may be initiated remotely. Technical details are known, but no exploit is available. The price for an exploit might be around USD $0-$5k at the moment (estimation calculated on 07/11/2019).
Upgrading to version 3.02B05 BETA03 eliminates this vulnerability.
The entries 137732, 137731 and 137730 are related to this item.
Type
Vendor
Name
VulDB Meta Base Score: 6.3
VulDB Meta Temp Score: 6.0
VulDB Base Score: β6.3
VulDB Temp Score: β6.0
VulDB Vector: π
VulDB Reliability: π
VulDB Base Score: π
VulDB Temp Score: π
VulDB Reliability: π
Class: Privilege escalation / Blank (CWE-269)
Local: No
Remote: Yes
Availability: π
Status: Not defined
Price Prediction: π
Current Price Estimation: π
0-Day | unlock | unlock | unlock | unlock |
---|---|---|---|---|
Today | unlock | unlock | unlock | unlock |
Threat Intelligence
Threat: π
Adversaries: π
Geopolitics: π
Economy: π
Predictions: π
Remediation: πRecommended: Upgrade
Status: π
0-Day Time: π
Upgrade: DIR-655 C 3.02B05 BETA03
07/11/2019 Advisory disclosed
07/11/2019 VulDB entry created
07/11/2019 CVE assigned
07/11/2019 VulDB last updateVendor: dlink.com
CVE: CVE-2019-13560 (π)
See also: πCreated: 07/11/2019 08:21 PM
Complete: π
Download the whitepaper to learn more about our service!
https://vuldb.com/?id.137729
Gloss