Overview
D-Link DIR-600 routers contain a cross-site request forgery (CSRF) vulnerability that allows an attacker to change router configurations by hijacking an existing administrator session.
https://legacy.us.dlink.com/pages/product.aspx?id=4587b63118524aec911191cc81605283; https://nvd.nist.gov/vuln/detail/CVE-2014-100005
Key Details
| Property | Value |
|---|---|
| CVE ID | CVE-2014-100005 |
| Vendor / Product | D-Link — DIR-600 Router |
| NVD Published | 2015-01-13 |
| NVD Last Modified | 2025-10-22 |
| CVSS 3.1 Score | 8.8 |
| CVSS 3.1 Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
| Severity | HIGH |
| CWE | CWE-352 |
| CISA KEV Added | 2024-05-16 |
| CISA KEV Deadline | 2024-06-06 |
| Known Ransomware Use | No |
CVSS 3.1 Breakdown
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Required Action
CISA BOD 22-01 Deadline: 2024-06-06.
This vulnerability affects legacy D-Link products. All associated hardware revisions have reached their end-of-life (EOL) or end-of-service (EOS) life cycle and should be retired and replaced per vendor instructions.
Timeline
| Date | Event |
|---|---|
| 2024-05-16 | Added to CISA Known Exploited Vulnerabilities catalog |
| 2024-06-06 | CISA BOD 22-01 remediation deadline |
References
| Resource | Type |
|---|---|
| NVD — CVE-2014-100005 | Vulnerability Database |
| CISA KEV Catalog Entry | US Government |