First published: Fri May 03 2024(Updated: )
D-Link DIR-2640 HNAP PrivateLogin Authentication Bypass Vulnerability. This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of D-Link DIR-2640 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the web management interface, which listens on TCP port 80 by default. A crafted XML element in the login request can cause authentication to succeed without providing proper credentials. An attacker can leverage this vulnerability to bypass authentication on the system. . Was ZDI-CAN-19545.
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
D-Link DIR-2640 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-32148 is classified as a medium severity vulnerability.
To fix CVE-2023-32148, users should update the firmware of their D-Link DIR-2640 to the latest version provided by D-Link.
Users of the D-Link DIR-2640 router with unpatched firmware are affected by CVE-2023-32148.
CVE-2023-32148 enables network-adjacent attackers to bypass authentication on affected routers.
No, authentication is not required to exploit CVE-2023-32148.