First published: Fri May 03 2024(Updated: )
D-Link DAP-1360 Hardcoded Credentials Authentication Bypass Vulnerability. This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of D-Link DAP-1360 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the processing of login requests to the web-based user interface. The firmware contains hard-coded default credentials. An attacker can leverage this vulnerability to bypass authentication on the system. . Was ZDI-CAN-18455.
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
D-Link DAP-1360 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-32145 is classified as a high-severity vulnerability that allows attackers to bypass authentication on D-Link DAP-1360 routers.
To mitigate CVE-2023-32145, users should update their D-Link DAP-1360 firmware to the latest version provided by the vendor.
CVE-2023-32145 affects all installations of the D-Link DAP-1360 router with hardcoded credentials.
No, CVE-2023-32145 requires network adjacency for exploitation, meaning attackers must be on the same local network.
No, authentication is not required to exploit CVE-2023-32145, allowing attackers to bypass it easily.