First published: Mon Mar 23 2020(Updated: )
This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of D-Link DIR-867, DIR-878, and DIR-882 routers with firmware 1.10B04. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of HNAP login requests. The issue results from the lack of proper implementation of the authentication algorithm. An attacker can leverage this vulnerability to escalate privileges and execute code in the context of the router. Was ZDI-CAN-9470.
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Dlink Dir-878 Firmware | <=1.20b03 | |
Dlink Dir-878 | ||
Dlink Dir-882 Firmware | <=1.10b04 | |
Dlink Dir-882 | ||
D-Link Multiple Routers | <=1.10b04 | |
D-Link Multiple Routers | ||
D-Link Multiple Routers |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2020-8863 is high (8.8).
CVE-2020-8863 affects D-Link DIR-867, DIR-878, and DIR-882 routers.
No, authentication is not required to exploit CVE-2020-8863.
Network-adjacent attackers can bypass authentication on affected installations of D-Link routers with firmware 1.10B04.
More information about CVE-2020-8863 can be found at the following references: [Reference 1](https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10157) and [Reference 2](https://www.zerodayinitiative.com/advisories/ZDI-20-267/).