D-Link G416 httpd Improper Handling of Exceptional Conditions Information Disclosure Vulnerability. This vulnerability allows network-adjacent attackers to disclose sensitive information on affected installations of D-Link G416 routers. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the HTTP service listening on TCP port 80. The issue results from the lack of proper handling of error conditions. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of root. Was ZDI-CAN-21664.
The specific flaw exists within the HTTP service listening on TCP port 80. The issue results from the lack of proper handling of error conditions. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of root. Was ZDI-CAN-21664.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-55034 | D-Link G416 httpd Improper Handling of Exceptional Conditions Information Disclosure Vulnerability. This vulnerability allows network-adjacent attackers to disclose sensitive information on affected installations of D-Link G416 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the HTTP service listening on TCP port 80. The issue results from the lack of proper handling of error conditions. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of root. Was ZDI-CAN-21664. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Mon, 10 Mar 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Dlink
Dlink g416 Dlink g416 Firmware |
|
| CPEs | cpe:2.3:h:dlink:g416:-:*:*:*:*:*:*:* cpe:2.3:o:dlink:g416_firmware:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
Dlink
Dlink g416 Dlink g416 Firmware |
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: zdi
Published:
Updated: 2024-08-02T22:09:49.690Z
Reserved: 2023-12-05T16:15:17.541Z
Link: CVE-2023-50212
Updated: 2024-08-02T22:09:49.690Z
Status : Undergoing Analysis
Published: 2024-05-03T03:16:08.620
Modified: 2025-03-10T16:26:06.647
Link: CVE-2023-50212
No data.
OpenCVE Enrichment
No data.
EUVD