{"containers":{"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"datePublic":"2014-01-21T00:00:00.000Z","descriptions":[{"lang":"en","value":"Multiple cross-site request forgery (CSRF) vulnerabilities in D-Link DIR-600 router (rev. Bx) with firmware before 2.17b02 allow remote attackers to hijack the authentication of administrators for requests that (1) create an administrator account or (2) enable remote management via a crafted configuration module to hedwig.cgi, (3) activate new configuration settings via a SETCFG,SAVE,ACTIVATE action to pigwidgeon.cgi, or (4) send a ping via a ping action to diagnostic.php."}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2017-09-07T15:57:01.000Z","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"references":[{"name":"57304","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/57304"},{"name":"dir600-settings-csrf(91794)","tags":["vdb-entry","x_refsource_XF"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/91794"},{"tags":["x_refsource_MISC"],"url":"http://resources.infosecinstitute.com/csrf-unauthorized-remote-admin-access/"},{"tags":["x_refsource_CONFIRM"],"url":"http://securityadvisories.dlink.com/security/publication.aspx?name=SAP10018"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2014-100005","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Multiple cross-site request forgery (CSRF) vulnerabilities in D-Link DIR-600 router (rev. Bx) with firmware before 2.17b02 allow remote attackers to hijack the authentication of administrators for requests that (1) create an administrator account or (2) enable remote management via a crafted configuration module to hedwig.cgi, (3) activate new configuration settings via a SETCFG,SAVE,ACTIVATE action to pigwidgeon.cgi, or (4) send a ping via a ping action to diagnostic.php."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"57304","refsource":"SECUNIA","url":"http://secunia.com/advisories/57304"},{"name":"dir600-settings-csrf(91794)","refsource":"XF","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/91794"},{"name":"http://resources.infosecinstitute.com/csrf-unauthorized-remote-admin-access/","refsource":"MISC","url":"http://resources.infosecinstitute.com/csrf-unauthorized-remote-admin-access/"},{"name":"http://securityadvisories.dlink.com/security/publication.aspx?name=SAP10018","refsource":"CONFIRM","url":"http://securityadvisories.dlink.com/security/publication.aspx?name=SAP10018"}]}}},"adp":[{"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":8,"attackVector":"ADJACENT_NETWORK","baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","integrityImpact":"HIGH","userInteraction":"NONE","attackComplexity":"LOW","availabilityImpact":"HIGH","privilegesRequired":"LOW","confidentialityImpact":"HIGH"}},{"other":{"type":"ssvc","content":{"id":"CVE-2014-100005","role":"CISA Coordinator","options":[{"Exploitation":"active"},{"Automatable":"no"},{"Technical Impact":"total"}],"version":"2.0.3","timestamp":"2024-07-30T16:03:21.114106Z"}}},{"other":{"type":"kev","content":{"dateAdded":"2024-05-16","reference":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2014-100005"}}}],"affected":[{"cpes":["cpe:2.3:o:dlink:dir-600_firmware:-:*:*:*:*:*:*:*"],"vendor":"dlink","product":"dir-600_firmware","versions":[{"status":"affected","version":"0","versionType":"custom","lessThanOrEqual":"2.16ww"}],"defaultStatus":"unknown"},{"cpes":["cpe:2.3:h:dlink:dir-600:-:*:*:*:*:*:*:*"],"vendor":"dlink","product":"dir-600","versions":[{"status":"affected","version":"0","lessThan":"*","versionType":"custom"}],"defaultStatus":"unknown"}],"references":[{"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2014-100005","tags":["government-resource"]}],"problemTypes":[{"descriptions":[{"lang":"en","type":"CWE","cweId":"CWE-352","description":"CWE-352 Cross-Site Request Forgery (CSRF)"}]}],"timeline":[{"time":"2024-05-16T00:00:00.000Z","lang":"en","value":"CVE-2014-100005 added to CISA KEV"}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-10-22T00:05:34.069Z"}},{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-06T14:10:55.911Z"},"title":"CVE Program Container","references":[{"name":"57304","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/57304"},{"name":"dir600-settings-csrf(91794)","tags":["vdb-entry","x_refsource_XF","x_transferred"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/91794"},{"tags":["x_refsource_MISC","x_transferred"],"url":"http://resources.infosecinstitute.com/csrf-unauthorized-remote-admin-access/"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://securityadvisories.dlink.com/security/publication.aspx?name=SAP10018"}]}]},"cveMetadata":{"assignerOrgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","assignerShortName":"mitre","cveId":"CVE-2014-100005","datePublished":"2015-01-13T11:00:00.000Z","dateReserved":"2015-01-13T00:00:00.000Z","dateUpdated":"2025-10-22T00:05:34.069Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}