First published: Wed Mar 29 2023(Updated: )
This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of D-Link DIR-1935 1.03 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of HNAP login requests. The issue results from an incorrectly implemented comparison. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-16152.
Credit: zdi-disclosures@trendmicro.com zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
D-Link DIR-1935 | ||
D-link Dir-1935 Firmware | <=1.02 | |
D-link Dir-1935 Firmware | =1.03-b1 | |
D-link Dir-1935 Firmware | =1.03-b2 | |
D-Link DIR-1935 | ||
Dlink Dir-1935 Firmware | <=1.02 | |
Dlink Dir-1935 Firmware | =1.03-b1 | |
Dlink Dir-1935 Firmware | =1.03-b2 | |
Dlink Dir-1935 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this D-Link router vulnerability is CVE-2022-43621.
CVE-2022-43621 has a severity rating of 8.8 (high).
Network-adjacent attackers can bypass authentication on affected installations of D-Link DIR-1935 1.03 routers without requiring authentication.
The specific flaw is an incorrect comparison within the handling of HNAP login requests.
This vulnerability affects D-Link DIR-1935 1.02, 1.03-b1, and 1.03-b2 firmware versions.