This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of D-Link DAP-1330 Wi-Fi range extenders. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of HNAP login requests. The issue results from the lack of proper handling of cookies. An attacker can leverage this vulnerability to execute arbitrary code on the router.
Affected Software | Affected Version | How to fix |
---|---|---|
D-Link DAP-1330 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
ZDI-CAN-9554 is classified as a high severity vulnerability that allows unauthenticated access.
To fix ZDI-CAN-9554, users should update the D-Link DAP-1330 firmware to the latest version provided by D-Link.
Exploitation of ZDI-CAN-9554 could allow attackers to gain unauthorized access to the device and potentially execute malicious actions.
ZDI-CAN-9554 specifically affects the D-Link DAP-1330 Wi-Fi range extenders.
No, ZDI-CAN-9554 requires network-adjacent access to exploit, making remote exploitation unlikely.