Authentication Bypass in D-Link Router Leading to Unauthorized Access
CVE-2017-7405

9.8CRITICAL

Key Information:

Vendor
D-Link
Status
Vendor
CVE Published:
7 July 2017

Summary

The D-Link DIR-615 model before version 20.12PTb04 is susceptible to an authentication bypass vulnerability. Once a user is authenticated, the router identifies the user based on their IP address. An attacker can exploit this flaw by spoofing the IP address of the victim's host, which may allow them to hijack the administrative session without requiring authentication credentials. Additionally, if the victim's web access is enabled and they are using the web interface from an external network, the attacker can sniff the network traffic to discover both the victim’s and the router’s IP addresses, enabling them to take over the session without prompting for credentials.

References

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.