Authentication Bypass in D-Link DIR-842 Router
CVE-2020-15632
8.8HIGH
Summary
This vulnerability allows network-adjacent attackers to bypass authentication on D-Link DIR-842 routers. The specific flaw lies in the handling of HNAP GetCAPTCHAsetting requests, which results in improper session management. Consequently, attackers can execute arbitrary code on the device, enhancing their control and potential impact on network security.
Affected Version(s)
DIR-842 3.13B05
References
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Adjacent Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
chung96vn - Security Researcher of VinCSS (Member of Vingroup)