D-Link DIR-615 Multiple Remote Security Vulnerabilities

Attackers can use a browser to exploit these issues. To exploit the cross-site request-forgery vulnerability an attacker must entice an unsuspecting victim into following a malicious URI.

Example URIs and requests are available. Please see the references for more information.

The following example exploit code is available:


Privacy Statement
Copyright 2010, SecurityFocus