Vulnerability Details CVE-2019-10039
                The D-Link DIR-816 A2 1.11 router only checks the random token when authorizing a goform request. An attacker can get this token from dir_login.asp and use an API URL /goform/setSysAdm to edit the web or system account without authentication.
                
                    Exploit prediction scoring system (EPSS) score
                    
                        
                            EPSS Score 0.012
                        
                    
                    
                        
                            EPSS Ranking 78.4%
                        
                    
                 
                
                    CVSS Severity
                    
                        
                            CVSS v3 Score 9.8
                        
                    
                    
                        
                            CVSS v2 Score 5.0
                        
                    
                 
                
                
                
                    
                
                
                    
                        Products affected by CVE-2019-10039
                        
                            
                                
                                - 
                                    
                                    
                                        
                                            cpe:2.3:h:dlink:dir-816:a2
                                         
 
- 
                                    
                                    
                                        
                                            cpe:2.3:o:dlink:dir-816_firmware:1.11