First published: Mon May 15 2023(Updated: )
This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of D-Link DIR-2150 routers. Authentication is not required to exploit this vulnerability.
Affected Software | Affected Version | How to fix |
---|---|---|
D-Link DIR-2150 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-CAN-20910 is classified as a high-risk vulnerability due to its potential for authentication bypass.
To fix ZDI-CAN-20910, update your D-Link DIR-2150 router to the latest firmware version provided by D-Link.
ZDI-CAN-20910 facilitates network-adjacent attackers in bypassing authentication on affected routers.
Users of D-Link DIR-2150 routers are affected by the ZDI-CAN-20910 vulnerability.
No, authentication is not required to exploit the ZDI-CAN-20910 vulnerability.