This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of D-Link DIR-867, DIR-878, and DIR-882 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of HNAP requests. The issue results from incorrect string matching logic when accessing protected pages. An attacker can leverage this vulnerability to escalate privileges and execute code in the context of the router.
Affected Software | Affected Version | How to fix |
---|---|---|
D-Link Multiple Routers |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
ZDI-CAN-10835 has a high severity rating due to the potential for unauthorized access to network devices.
To fix ZDI-CAN-10835, update the firmware of your D-Link DIR-867, DIR-878, or DIR-882 routers to the latest version.
ZDI-CAN-10835 affects D-Link DIR-867, DIR-878, and DIR-882 routers.
No, ZDI-CAN-10835 requires network-adjacent access to exploit the vulnerability.
If compromised, immediately update your router firmware, change your router credentials, and monitor your network for unusual activity.