First published: Sat Feb 22 2020(Updated: )
This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of D-Link DAP-1330 1.10B01 BETA Wi-Fi range extenders. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of HNAP login requests. The issue results from the lack of proper handling of cookies. An attacker can leverage this vulnerability to execute arbitrary code on the router. Was ZDI-CAN-9554.
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
D-Link DAP-1330 | ||
Dlink Dap-1330 Firmware | <1.10b01 | |
Dlink Dap-1330 Firmware | =1.10b01-beta | |
Dlink Dap-1330 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-8861 is a vulnerability that allows network-adjacent attackers to bypass authentication on affected installations of D-Link DAP-1330 Wi-Fi range extenders.
The severity of CVE-2020-8861 is high with a CVSS score of 8.8.
The CVE-2020-8861 vulnerability affects D-Link DAP-1330 devices by allowing authentication bypass.
The affected software version for CVE-2020-8861 is D-Link DAP-1330 1.10B01 BETA firmware.
No, authentication is not required to exploit CVE-2020-8861.