First published: Mon May 15 2023(Updated: )
This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of D-Link DIR-2150 routers. Authentication is not required to exploit this vulnerability.
Affected Software | Affected Version | How to fix |
---|---|---|
D-Link DIR-2150 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-CAN-20552 is considered critical due to the authentication bypass vulnerability.
To fix ZDI-CAN-20552, update your D-Link DIR-2150 router to the latest firmware version available from D-Link.
Users of D-Link DIR-2150 routers are affected by the ZDI-CAN-20552 vulnerability.
ZDI-CAN-20552 requires network-adjacent access, meaning an attacker must be on the same local network to exploit this vulnerability.
If ZDI-CAN-20552 is exploited, attackers can gain unauthorized access to the router and potentially manipulate network traffic.