This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of D-Link DIR-867, DIR-878, and DIR-882 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of HNAP login requests. The issue results from the lack of proper implementation of the authentication algorithm. An attacker can leverage this vulnerability to escalate privileges and execute code in the context of the router.
Affected Software | Affected Version | How to fix |
---|---|---|
D-Link Multiple Routers |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
ZDI-20-267 has been designated a high severity vulnerability due to its potential to allow unauthorized access to router configurations.
To fix ZDI-20-267, update your D-Link DIR-867, DIR-878, or DIR-882 routers to the latest firmware version as recommended by D-Link.
ZDI-20-267 affects D-Link DIR-867, DIR-878, and DIR-882 routers among other D-Link multiple routers.
Yes, ZDI-20-267 can be exploited by network-adjacent attackers without authentication.
The nature of the vulnerability in ZDI-20-267 lies in improper handling of HNAP login requests, allowing bypass of authentication.