This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of D-Link DIR-842 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the processing of HNAP GetCAPTCHAsetting requests. The issue results from the lack of proper handling of sessions. An attacker can leverage this vulnerability to execute arbitrary code in the context of the device.
Affected Software | Affected Version | How to fix |
---|---|---|
D-Link DIR-842 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-CAN-10083 is high due to the potential for network-adjacent attackers to bypass authentication.
To fix ZDI-CAN-10083, update your D-Link DIR-842 router to the latest firmware version provided by D-Link.
ZDI-CAN-10083 affects installations of D-Link DIR-842 routers that have not been updated to patch the vulnerability.
ZDI-CAN-10083 enables network-adjacent attackers to bypass authentication and potentially gain unauthorized access.
Currently, the most effective workaround for ZDI-CAN-10083 is to apply the necessary firmware updates as they become available.