Authentication Bypass in D-Link DIR-842 Router
CVE-2020-15632

8.8HIGH

Key Information:

Vendor
D-link
Status
Vendor
CVE Published:
23 July 2020

Summary

This vulnerability allows network-adjacent attackers to bypass authentication on D-Link DIR-842 routers. The specific flaw lies in the handling of HNAP GetCAPTCHAsetting requests, which results in improper session management. Consequently, attackers can execute arbitrary code on the device, enhancing their control and potential impact on network security.

Affected Version(s)

DIR-842 3.13B05

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Adjacent Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

chung96vn - Security Researcher of VinCSS (Member of Vingroup)
.