D-Link DIR-2150 LoginPassword Incorrect Implementation of Authentication Algorithm Authentication Bypass Vulnerability
CVE-2023-34274

8.8HIGH

Key Information:

Vendor

D-link

Status
Vendor
CVE Published:
3 May 2024

What is CVE-2023-34274?

A significant security flaw exists in the authentication process of D-Link DIR-2150 routers, specifically related to the implementation of the SOAP API interface. This flaw allows network-adjacent attackers to bypass required authentication procedures, enabling unauthorized access to the router's functionalities. By sending a specially crafted login request to the service, attackers can succeed in logging into the system without entering valid credentials. The SOAP API, which operates on TCP port 80 by default, is particularly vulnerable, exposing installations of the DIR-2150 to potential exploitation. Organizations using this router should assess their security measures, as this vulnerability poses a serious risk to their network integrity.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

DIR-2150 1.05B01

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Adjacent Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.