Логотип exploitDog
bind:CVE-2020-15633
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-15633

Количество 3

Количество 3

nvd логотип

CVE-2020-15633

больше 5 лет назад

This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of D-Link DIR-867, DIR-878, and DIR-882 routers with firmware 1.20B10_BETA. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of HNAP requests. The issue results from incorrect string matching logic when accessing protected pages. An attacker can leverage this vulnerability to escalate privileges and execute code in the context of the router. Was ZDI-CAN-10835.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-mm3r-85wp-99j8

больше 3 лет назад

This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of D-Link DIR-867, DIR-878, and DIR-882 routers with firmware 1.20B10_BETA. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of HNAP requests. The issue results from incorrect string matching logic when accessing protected pages. An attacker can leverage this vulnerability to escalate privileges and execute code in the context of the router. Was ZDI-CAN-10835.

CVSS3: 8.8
EPSS: Низкий
fstec логотип

BDU:2023-02615

больше 5 лет назад

Уязвимость реализации протокола HNAP (Home Network Administration Protocol) микропрограммного обеспечения Wi-Fi роутеров D-Link DIR-867-US, DIR-878, DIR-882-US, позволяющая нарушителю обойти ограничения безопасности, повысить свои привилегии или выполнить произвольный код

CVSS3: 8.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2020-15633

This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of D-Link DIR-867, DIR-878, and DIR-882 routers with firmware 1.20B10_BETA. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of HNAP requests. The issue results from incorrect string matching logic when accessing protected pages. An attacker can leverage this vulnerability to escalate privileges and execute code in the context of the router. Was ZDI-CAN-10835.

CVSS3: 8.8
1%
Низкий
больше 5 лет назад
github логотип
GHSA-mm3r-85wp-99j8

This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of D-Link DIR-867, DIR-878, and DIR-882 routers with firmware 1.20B10_BETA. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of HNAP requests. The issue results from incorrect string matching logic when accessing protected pages. An attacker can leverage this vulnerability to escalate privileges and execute code in the context of the router. Was ZDI-CAN-10835.

CVSS3: 8.8
1%
Низкий
больше 3 лет назад
fstec логотип
BDU:2023-02615

Уязвимость реализации протокола HNAP (Home Network Administration Protocol) микропрограммного обеспечения Wi-Fi роутеров D-Link DIR-867-US, DIR-878, DIR-882-US, позволяющая нарушителю обойти ограничения безопасности, повысить свои привилегии или выполнить произвольный код

CVSS3: 8.8
1%
Низкий
больше 5 лет назад

Уязвимостей на страницу