First published: Mon Mar 23 2020(Updated: )
This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of D-Link DIR-867, DIR-878, and DIR-882 routers with firmware 1.10B04. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of HNAP login requests. The issue results from the lack of proper handling of empty passwords. An attacker can leverage this vulnerability to execute arbitrary code on the router. Was ZDI-CAN-9471.
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Dlink Dir-878 Firmware | <=1.20b03 | |
Dlink Dir-878 | ||
Dlink Dir-882 Firmware | <=1.10b04 | |
Dlink Dir-882 | ||
D-Link Multiple Routers | <=1.10b04 | |
D-Link Multiple Routers | ||
D-Link Multiple Routers |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-8864 is a vulnerability that allows network-adjacent attackers to bypass authentication on affected installations of D-Link routers.
CVE-2020-8864 affects D-Link DIR-867, DIR-878, and DIR-882 routers.
No, authentication is not required to exploit CVE-2020-8864.
The severity of CVE-2020-8864 is high, with a severity value of 8.8.
To fix the CVE-2020-8864 vulnerability, it is recommended to update the firmware of the affected D-Link routers to the latest version.