Description
Multiple cross-site request forgery (CSRF) vulnerabilities in D-Link DSL-2740B Gateway with firmware EU_1.00 allow remote attackers to hijack the authentication of administrators for requests that (1) enable or disable Wireless MAC Address Filters via a wlFltMode action to wlmacflt.cmd, (2) enable or disable firewall protections via a request to scdmz.cmd, or (3) enable or disable remote management via a save action to scsrvcntr.cmd.
Exploits (1)
exploitdb
WORKING POC
by Ivano Binetti · textwebappshardware
https://www.exploit-db.com/exploits/28239
References (4)
Core 4
Core References
Exploit x_refsource_misc
http://www.webapp-security.com/wp-content/uploads/2013/09/D-Link-DSL-2740B-Multiple-CSRF-Vulnerabilities1.txt
Vendor Advisory x_refsource_confirm
http://securityadvisories.dlink.com/security/publication.aspx?name=SAP10004
Exploit x_refsource_misc
http://packetstormsecurity.com/files/123200/D-Link-DSL-2740B-Cross-Site-Request-Forgery.html
Various Sources x_refsource_misc
http://www.webapp-security.com/2013/09/d-link-dsl-2740b-multiple-csrf-vulnerabilities
Scores
EPSS
0.0706
EPSS Percentile
91.5%
Details
CWE
CWE-352
Status
published
Products (2)
dlink/dsl-2740b
dlink/dsl-2740b_firmware
1.00
Published
Nov 20, 2013
Tracked Since
Feb 18, 2026