First published: Fri Aug 25 2023(Updated: )
This vulnerability allows network-adjacent attackers to make unauthorized changes to device configuration on affected installations of D-Link DAP-2622 routers. Authentication is not required to exploit this vulnerability.
Affected Software | Affected Version | How to fix |
---|---|---|
D-Link DAP-2622 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-CAN-20104 is considered critical due to its potential for unauthorized device configuration changes by network-adjacent attackers.
To fix ZDI-CAN-20104, update your D-Link DAP-2622 router to the latest firmware version provided by D-Link.
Any installation of D-Link DAP-2622 routers that has not been updated with the security patch is vulnerable to ZDI-CAN-20104.
Attackers exploiting ZDI-CAN-20104 can make unauthorized changes to the device configuration without authentication.
No, authentication is not required to exploit ZDI-CAN-20104, making it particularly dangerous.