First published: Wed Mar 29 2023(Updated: )
This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of D-Link DIR-1935 1.03 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of HNAP login requests. The issue results from the lack of proper implementation of the authentication algorithm. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-16142.
Credit: zdi-disclosures@trendmicro.com zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
D-Link DIR-1935 | ||
D-link Dir-1935 Firmware | <=1.02 | |
D-link Dir-1935 Firmware | =1.03-b1 | |
D-link Dir-1935 Firmware | =1.03-b2 | |
D-Link DIR-1935 | ||
Dlink Dir-1935 Firmware | <=1.02 | |
Dlink Dir-1935 Firmware | =1.03-b1 | |
Dlink Dir-1935 Firmware | =1.03-b2 | |
Dlink Dir-1935 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this exploit is CVE-2022-43620.
The severity of CVE-2022-43620 is high with a score of 8.8.
An attacker can exploit this vulnerability by bypassing authentication on affected installations of D-Link DIR-1935 1.03 routers.
No, authentication is not required to exploit CVE-2022-43620.
You can find more information about CVE-2022-43620 in the references provided: [SAP10310](https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10310) and [ZDI-22-1494](https://www.zerodayinitiative.com/advisories/ZDI-22-1494/).