Vulnerability Details CVE-2019-10042
The D-Link DIR-816 A2 1.11 router only checks the random token when authorizing a goform request. An attacker can get this token from dir_login.asp and use an API URL /goform/LoadDefaultSettings to reset the router without authentication.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.008
EPSS Ranking 73.1%
CVSS Severity
CVSS v3 Score 7.5
CVSS v2 Score 7.8
Products affected by CVE-2019-10042
-
cpe:2.3:h:dlink:dir-816:a2
-
cpe:2.3:o:dlink:dir-816_firmware:1.11