This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of D-Link DIR-1935 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of HNAP login requests. The issue results from an incorrectly implemented comparison. An attacker can leverage this vulnerability to bypass authentication on the system.
Affected Software | Affected Version | How to fix |
---|---|---|
D-Link DIR-1935 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-22-1503 is high due to the potential for network-adjacent attackers to bypass authentication without any required credentials.
To fix ZDI-22-1503, update the D-Link DIR-1935 router firmware to the latest version provided by D-Link.
ZDI-22-1503 can allow attackers to gain unauthorized access to the router's administrative interface and manipulate its configuration.
The vulnerability ZDI-22-1503 affects installations of D-Link DIR-1935 routers that have not yet been updated to address the issue.
No, authentication is not required to exploit the vulnerability ZDI-22-1503, making it particularly dangerous.