Discover the security vulnerability in D-Link DIR-823G devices allowing unauthorized remote attackers to manipulate DNS service configuration without authentication. Learn how to mitigate CVE-2019-7390.
A vulnerability has been identified in the /bin/goahead file of D-Link DIR-823G devices running firmware version 1.02B03. The issue involves improper access control, enabling unauthorized remote attackers to manipulate the DNS service configuration of all WLAN clients without authentication.
Understanding CVE-2019-7390
This CVE entry describes a security vulnerability in D-Link DIR-823G devices that allows remote attackers to manipulate DNS service configuration without authentication.
What is CVE-2019-7390?
The vulnerability in /bin/goahead on D-Link DIR-823G devices with firmware 1.02B03 allows unauthorized remote attackers to hijack the DNS service configuration of all WLAN clients via the SetWanSettings HNAP API.
The Impact of CVE-2019-7390
Technical Details of CVE-2019-7390
This section provides technical details about the vulnerability.
Vulnerability Description
Affected Systems and Versions
Exploitation Mechanism
Mitigation and Prevention
Protect your systems from CVE-2019-7390 with the following steps:
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates