Логотип exploitDog
bind:CVE-2022-43621
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2022-43621

Количество 3

Количество 3

nvd логотип

CVE-2022-43621

больше 2 лет назад

This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of D-Link DIR-1935 1.03 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of HNAP login requests. The issue results from an incorrectly implemented comparison. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-16152.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-24q5-7fw8-5m7f

больше 2 лет назад

This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of D-Link DIR-1935 1.03 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of HNAP login requests. The issue results from an incorrectly implemented comparison. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-16152.

CVSS3: 8.8
EPSS: Низкий
fstec логотип

BDU:2022-06861

около 3 лет назад

Уязвимость реализации протокола Home Network Administration Protocol (HNAP) микропрограммного обеспечения маршрутизаторов D-Link DIR-1935, позволяющая нарушителю обойти ограничения безопасности

CVSS3: 8.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2022-43621

This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of D-Link DIR-1935 1.03 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of HNAP login requests. The issue results from an incorrectly implemented comparison. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-16152.

CVSS3: 8.8
1%
Низкий
больше 2 лет назад
github логотип
GHSA-24q5-7fw8-5m7f

This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of D-Link DIR-1935 1.03 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of HNAP login requests. The issue results from an incorrectly implemented comparison. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-16152.

CVSS3: 8.8
1%
Низкий
больше 2 лет назад
fstec логотип
BDU:2022-06861

Уязвимость реализации протокола Home Network Administration Protocol (HNAP) микропрограммного обеспечения маршрутизаторов D-Link DIR-1935, позволяющая нарушителю обойти ограничения безопасности

CVSS3: 8.8
1%
Низкий
около 3 лет назад

Уязвимостей на страницу