Логотип exploitDog
bind:CVE-2022-43621
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2022-43621

Количество 3

Количество 3

nvd логотип

CVE-2022-43621

почти 3 года назад

This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of D-Link DIR-1935 1.03 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of HNAP login requests. The issue results from an incorrectly implemented comparison. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-16152.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-24q5-7fw8-5m7f

почти 3 года назад

This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of D-Link DIR-1935 1.03 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of HNAP login requests. The issue results from an incorrectly implemented comparison. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-16152.

CVSS3: 8.8
EPSS: Низкий
fstec логотип

BDU:2022-06861

больше 3 лет назад

Уязвимость реализации протокола Home Network Administration Protocol (HNAP) микропрограммного обеспечения маршрутизаторов D-Link DIR-1935, позволяющая нарушителю обойти ограничения безопасности

CVSS3: 8.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2022-43621

This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of D-Link DIR-1935 1.03 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of HNAP login requests. The issue results from an incorrectly implemented comparison. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-16152.

CVSS3: 8.8
1%
Низкий
почти 3 года назад
github логотип
GHSA-24q5-7fw8-5m7f

This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of D-Link DIR-1935 1.03 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of HNAP login requests. The issue results from an incorrectly implemented comparison. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-16152.

CVSS3: 8.8
1%
Низкий
почти 3 года назад
fstec логотип
BDU:2022-06861

Уязвимость реализации протокола Home Network Administration Protocol (HNAP) микропрограммного обеспечения маршрутизаторов D-Link DIR-1935, позволяющая нарушителю обойти ограничения безопасности

CVSS3: 8.8
1%
Низкий
больше 3 лет назад

Уязвимостей на страницу