An issue was discovered on D-Link DIR-600M 3.02, 3.03, 3.04, and 3.06 devices. wan.htm can be accessed directly without authentication, which can lead to disclosure of information about the WAN, and can also be leveraged by an attacker to modify the data fields of the page.
                
            References
                    | Link | Resource | 
|---|---|
| http://packetstormsecurity.com/files/153994/D-Link-DIR-600M-Wireless-N-150-Home-Router-Access-Bypass.html | Third Party Advisory VDB Entry | 
| http://seclists.org/fulldisclosure/2019/Aug/5 | Mailing List Third Party Advisory | 
| https://github.com/d0x0/D-Link-DIR-600M/blob/master/CVE-2019-13101 | Third Party Advisory | 
| https://seclists.org/bugtraq/2019/Aug/17 | Mailing List Third Party Advisory | 
| https://us.dlink.com/en/security-advisory | Vendor Advisory | 
| https://www.ftc.gov/system/files/documents/cases/dlink_proposed_order_and_judgment_7-2-19.pdf | Third Party Advisory US Government Resource | 
Configurations
                    Configuration 1 (hide)
| AND | 
            
            
 
  | 
    
History
                    No history.
Information
                Published : 2019-08-08 13:15
Updated : 2021-04-23 15:17
NVD link : CVE-2019-13101
Mitre link : CVE-2019-13101
CVE.ORG link : CVE-2019-13101
JSON object : View
Products Affected
                dlink
- dir-600m
 - dir-600m_firmware
 
CWE
                
                    
                        
                        CWE-306
                        
            Missing Authentication for Critical Function
