Show plain JSON{"id": "CVE-2017-7404", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 6.8, "accessVector": "NETWORK", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "MEDIUM", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 6.4, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 8.6, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true}], "cvssMetricV31": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 8.8, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "REQUIRED", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "HIGH"}, "impactScore": 5.9, "exploitabilityScore": 2.8}]}, "published": "2017-07-07T12:29:00.260", "references": [{"url": "ftp://ftp2.dlink.com/SECURITY_ADVISEMENTS/DIR-615/REVT/DIR-615_REVT_FIRMWARE_PATCH_v20.12PTb04.zip", "tags": ["Patch", "Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "https://www.qualys.com/2017/03/12/qsa-2017-03-12/qsa-2017-03-12.pdf", "tags": ["Third Party Advisory"], "source": "cve@mitre.org"}], "vulnStatus": "Analyzed", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-352"}]}], "descriptions": [{"lang": "en", "value": "On the D-Link DIR-615 before v20.12PTb04, if a victim logged in to the Router's Web Interface visits a malicious site from another Browser tab, the malicious site then can send requests to the victim's Router without knowing the credentials (CSRF). An attacker can host a page that sends a POST request to Form2File.htm that tries to upload Firmware to victim's Router. This causes the router to reboot/crash resulting in Denial of Service. An attacker may succeed in uploading malicious Firmware."}, {"lang": "es", "value": "En D-Link DIR-615 en versiones anteriores a v20.12PTb04, si una v\u00edctima con sesi\u00f3n iniciada en la interfaz web del router visita un sitio malicioso desde otra pesta\u00f1a Browser, el sitio malicioso podr\u00eda enviar peticiones al router de la v\u00edctima sin conocer las credenciales (CSRF). Un atacante podr\u00eda alojar una p\u00e1gina que env\u00eda una petici\u00f3n POST a Form2File.htm que intenta subir firmware al router de la v\u00edctima. Esto provoca que el router se reinicie/cierre inesperadamente, resultando en una denegaci\u00f3n de servicio. Un atacante podr\u00eda tener \u00e9xito a la hora de subir firmware malicioso."}], "lastModified": "2021-04-23T15:14:05.647", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:dlink:dir-615:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "2E92E959-C211-4979-A233-163BEFCF6F0D"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:dlink:dir-615:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F1744224-B87C-4342-AC97-21668EB17709", "versionEndIncluding": "20.12ptb01"}], "operator": "OR"}], "operator": "AND"}], "sourceIdentifier": "cve@mitre.org"}