First published: Thu Nov 17 2022(Updated: )
D-Link – G integrated Access Device4 Information Disclosure & Authorization Bypass. *Information Disclosure – file contains a URL with private IP at line 15 "login.asp" A. The window.location.href = http://192.168.1.1/setupWizard.asp" http://192.168.1.1/setupWizard.asp" ; "admin" – contains default username value "login.asp" B. While accessing the web interface, the login form at *Authorization Bypass – URL by "setupWizard.asp' while it blocks direct access to – the web interface does not properly validate user identity variables values located at the client side, it is available to access it without a "login_glag" and "login_status" checking browser and to read the admin user credentials for the web interface.
Credit: cna@cyber.gov.il
Affected Software | Affected Version | How to fix |
---|---|---|
Dlink G Integrated Access Device4 | =1.0 | |
Dlink G Integrated Access Device4 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-36785 has been classified as a medium severity vulnerability due to its potential for information disclosure and authorization bypass.
To fix CVE-2022-36785, users should update the D-Link G Integrated Access Device4 firmware to the latest version that addresses this vulnerability.
CVE-2022-36785 can be exploited to gain unauthorized access to sensitive information due to improper handling of URLs leading to internal resources.
CVE-2022-36785 specifically affects the D-Link G Integrated Access Device4 with firmware version 1.0.
CVE-2022-36785 is classified as an information disclosure and authorization bypass vulnerability.