D-Link DIR-2150 HNAP Incorrect Implementation of Authentication Algorithm Authentication Bypass Vulnerability
CVE-2023-34282

8.8HIGH

Key Information:

Vendor
D-link
Status
Vendor
CVE Published:
3 May 2024

Summary

The vulnerability identified in the D-Link DIR-2150 routers pertains to an authentication bypass flaw in the implementation of the authentication algorithm within the SOAP API interface, which operates on TCP port 80 by default. This flaw allows network-adjacent attackers to exploit the system without the necessity of authentication, effectively enabling unauthorized access to the router's functionalities. By crafting a specific authentication header, attackers can manipulate the system into accepting invalid credentials, posing a significant risk to network integrity and user data security. This vulnerability emphasizes the necessity for robust security measures in router configurations to safeguard against unauthorized system access.

Affected Version(s)

DIR-2150 1.05B01

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Adjacent Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.