Home

Description

Devolo dLAN 500 AV Wireless+ 3.1.0-1 contains a cross-site request forgery vulnerability that allows attackers to perform administrative actions without proper request validation. Attackers can craft malicious web pages that trigger unauthorized configuration changes by exploiting predictable URL actions when a logged-in user visits the site.

PUBLISHED Reserved 2025-12-24 | Published 2025-12-24 | Updated 2025-12-24 | Assigner VulnCheck




MEDIUM: 5.1CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
MEDIUM: 5.3CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

Problem types

Cross-Site Request Forgery (CSRF)

Product status

500 AV Wireless+ 3.1.0-1
affected

Credits

Stefan Petrushevski aka sm @zeroscience finder

References

www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5507.php exploit

www.exploit-db.com/exploits/46324 (ExploitDB-46324) exploit

www.devolo.com (Official Product Homepage) product

www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5507.php (Zero Science Lab Disclosure (ZSL-2019-5507)) third-party-advisory

cve.org (CVE-2019-25250)

nvd.nist.gov (CVE-2019-25250)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.