This vulnerability allows network-adjacent attackers to disclose sensitive information on affected installations of D-Link DAP-2020 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of the getpage parameter provided to the webproc endpoint. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to disclose information in the context of root.
Affected Software | Affected Version | How to fix |
---|---|---|
D-Link DAP-2020 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-CAN-12103 is significant as it allows unauthorized access to sensitive information on affected D-Link DAP-2020 routers.
To fix ZDI-CAN-12103, update the firmware of your D-Link DAP-2020 router to the latest version provided by the manufacturer.
ZDI-CAN-12103 affects users of D-Link DAP-2020 routers, particularly those with unpatched firmware.
Yes, ZDI-CAN-12103 can be exploited by network-adjacent attackers without authentication.
ZDI-CAN-12103 can disclose sensitive information stored on the affected D-Link DAP-2020 routers.