Authentication Bypass in D-Link Router Leading to Unauthorized Access
CVE-2017-7405
9.8CRITICAL
Summary
The D-Link DIR-615 model before version 20.12PTb04 is susceptible to an authentication bypass vulnerability. Once a user is authenticated, the router identifies the user based on their IP address. An attacker can exploit this flaw by spoofing the IP address of the victim's host, which may allow them to hijack the administrative session without requiring authentication credentials. Additionally, if the victim's web access is enabled and they are using the web interface from an external network, the attacker can sniff the network traffic to discover both the victim’s and the router’s IP addresses, enabling them to take over the session without prompting for credentials.
References
CVSS V3.1
Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved