First published: Thu Jul 23 2020(Updated: )
This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of D-Link DIR-867, DIR-878, and DIR-882 routers with firmware 1.20B10_BETA. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of HNAP requests. The issue results from incorrect string matching logic when accessing protected pages. An attacker can leverage this vulnerability to escalate privileges and execute code in the context of the router. Was ZDI-CAN-10835.
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
D-Link Multiple Routers | ||
D-link Dir-867 Firmware | <=1.20b10 | |
Dlink Dir-867 | ||
D-link Dir-878 Firmware | <=1.20b05 | |
Dlink Dir-878 | ||
D-link Dir-882 Firmware | ||
Dlink Dir-882 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2020-15633 is high with a CVSS score of 8.8.
D-Link DIR-867, DIR-878, and DIR-882 routers with specific firmware versions are affected by CVE-2020-15633.
No, authentication is not required to exploit CVE-2020-15633.
An attacker can exploit CVE-2020-15633 by bypassing authentication on affected D-Link routers.
To protect your D-Link router from CVE-2020-15633, ensure that you have installed the latest firmware update provided by D-Link.