This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of D-Link DAP-1330 Wi-Fi range extenders. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of HNAP login requests. The issue results from the lack of proper handling of cookies. An attacker can leverage this vulnerability to execute arbitrary code on the router.
Affected Software | Affected Version | How to fix |
---|---|---|
D-Link DAP-1330 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-20-265 is classified as high due to the ability of network-adjacent attackers to bypass authentication.
To fix ZDI-20-265, users should update their D-Link DAP-1330 Wi-Fi range extender to the latest firmware provided by D-Link.
ZDI-20-265 can be exploited by network-adjacent attackers to achieve unauthorized access to the affected device.
The affected devices for ZDI-20-265 are specifically the D-Link DAP-1330 Wi-Fi range extenders.
No, authentication is not required to exploit ZDI-20-265, making it a critical vulnerability.