By zerosday cve bot•May 16, 2024•
cves
CVE-2014-100005: D-Link DIR-600 Router Cross-Site Request Forgery (CSRF) Vulnerability (Pentest Lab Guide)

CVE-2014-100005: Technical Deep-Dive (Auto Refreshed)
Generated on 2026-03-25T19:49:16.048Z. This file is automatically regenerated every 30 minutes by the CVE AI enrichment job using web sources (NVD, MITRE, CISA KEV, GitHub).
Executive Technical Summary
Multiple cross-site request forgery (CSRF) vulnerabilities in D-Link DIR-600 router (rev. Bx) with firmware before 2.17b02 allow remote attackers to hijack the authentication of administrators for requests that (1) create an administrator account or (2) enable remote management via a crafted configuration module to hedwig.cgi, (3) activate new configuration settings via a SETCFG,SAVE,ACTIVATE action to pigwidgeon.cgi, or (4) send a ping via a ping action to diagnostic.php.
- Context preserved from previous revision: Multiple cross-site request forgery (CSRF) vulnerabilities in D-Link DIR-600 router (rev. Bx) with firmware before 2.17b02 allow remote attackers to hijack the authentication of administrators for requests that (1) create an administrator account or (2) enable remote management via a crafted configuration module to hedwig.cgi, (3) activate new configuration settings via a SETCFG,SAVE,ACTIVATE action to pigwidgeon.cgi, or (4) send a ping via a ping action to diagnostic.php. Notes: Pentest reports of the metasploit virtual lab for pratices
Technical Details
- CVE: CVE-2014-100005
- KEV date added: 2024-05-16
- KEV due date: 2024-06-06
- NVD published: 2015-01-13
- NVD modified: 2025-10-22
- MITRE modified: 2025-10-22
- CVSS base score: 8.8
- CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
- CVSS exploitability score: 2.8
- CVSS impact score: 5.9
- Attack vector: Network
- Attack complexity: Low
- Privileges required: None
- User interaction: Required
- Scope: Unchanged
- Confidentiality impact: High
- Integrity impact: High
- Availability impact: High
Versions and Products Impacted
- dlink / dir-600 firmware (versions: <= 2.16ww)
- n/a / n/a (versions: n/a)
- dlink / dir-600_firmware (versions: 0)
- dlink / dir-600 (versions: 0)
Weakness Classification
- CWE-352
Repositories for Lab Validation (Public Examples)
- pedr0alencar/vlab-metasploitable2 | stars: 0 | updated: 2025-08-07 | https://github.com/pedr0alencar/vlab-metasploitable2
Notes: Pentest reports of the metasploit virtual lab for pratices - Dom-Techblue/Relatorio_pentest | stars: 0 | updated: 2025-07-07 | https://github.com/Dom-Techblue/Relatorio_pentest
Notes: Utilização de nmap e explicações de vulnerabilidades
People and Organizations Mentioned
- mitre
- D-Link
- DIR-600 Router
- pedr0alencar
- Dom-Techblue
Practical Defensive Validation (Authorized Only)
- Use only isolated environments and systems you own or are explicitly authorized to test.
- Snapshot infrastructure before validation and preserve baseline logs (EDR, SIEM, OS, app).
- Inventory dlink / dir-600 firmware (versions: <= 2.16ww) assets and confirm exact vulnerable versions with automated checks.
- Patch in staged environments and validate closure with scanners + service health checks.
- Map detections to MITRE ATT&CK tactics relevant to your environment and tune alert quality.
References
- NVD record: https://nvd.nist.gov/vuln/detail/CVE-2014-100005
- MITRE CVE record: https://www.cve.org/CVERecord?id=CVE-2014-100005
- CISA KEV Catalog: https://www.cisa.gov/known-exploited-vulnerabilities-catalog
- CISA KEV JSON feed: https://www.cisa.gov/sites/default/files/feeds/known_exploited_vulnerabilities.json
- KEV notes: https://legacy.us.dlink.com/pages/product.aspx?id=4587b63118524aec911191cc81605283; https://nvd.nist.gov/vuln/detail/CVE-2014-100005
- http://resources.infosecinstitute.com/csrf-unauthorized-remote-admin-access/
- http://secunia.com/advisories/57304
- http://securityadvisories.dlink.com/security/publication.aspx?name=SAP10018
- https://exchange.xforce.ibmcloud.com/vulnerabilities/91794
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2014-100005
- Repository example: https://github.com/pedr0alencar/vlab-metasploitable2
- Repository example: https://github.com/Dom-Techblue/Relatorio_pentest
This content is for defensive security training and authorized validation only.
