Логотип exploitDog
bind:CVE-2023-44420
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-44420

Количество 3

Количество 3

nvd логотип

CVE-2023-44420

почти 2 года назад

D-Link DIR-X3260 prog.cgi Incorrect Implementation of Authentication Algorithm Authentication Bypass Vulnerability. This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of D-Link DIR-X3260 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the prog.cgi executable. The issue results from an incorrect implementation of the authentication algorithm. An attacker can leverage this vulnerability to bypass authentication on the device. Was ZDI-CAN-21100.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-h9q2-gj3j-2x77

почти 2 года назад

D-Link DIR-X3260 prog.cgi Incorrect Implementation of Authentication Algorithm Authentication Bypass Vulnerability. This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of D-Link DIR-X3260 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the prog.cgi executable. The issue results from an incorrect implementation of the authentication algorithm. An attacker can leverage this vulnerability to bypass authentication on the device. Was ZDI-CAN-21100.

CVSS3: 8.8
EPSS: Низкий
fstec логотип

BDU:2023-06368

больше 2 лет назад

Уязвимость компонента prog.cgi микропрограммного обеспечения Wi-Fi маршрутизаторов D-Link DIR-X3260, позволяющая нарушителю обойти процесс аутентификации и получить полный доступ к устройству

CVSS3: 8.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2023-44420

D-Link DIR-X3260 prog.cgi Incorrect Implementation of Authentication Algorithm Authentication Bypass Vulnerability. This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of D-Link DIR-X3260 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the prog.cgi executable. The issue results from an incorrect implementation of the authentication algorithm. An attacker can leverage this vulnerability to bypass authentication on the device. Was ZDI-CAN-21100.

CVSS3: 8.8
0%
Низкий
почти 2 года назад
github логотип
GHSA-h9q2-gj3j-2x77

D-Link DIR-X3260 prog.cgi Incorrect Implementation of Authentication Algorithm Authentication Bypass Vulnerability. This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of D-Link DIR-X3260 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the prog.cgi executable. The issue results from an incorrect implementation of the authentication algorithm. An attacker can leverage this vulnerability to bypass authentication on the device. Was ZDI-CAN-21100.

CVSS3: 8.8
0%
Низкий
почти 2 года назад
fstec логотип
BDU:2023-06368

Уязвимость компонента prog.cgi микропрограммного обеспечения Wi-Fi маршрутизаторов D-Link DIR-X3260, позволяющая нарушителю обойти процесс аутентификации и получить полный доступ к устройству

CVSS3: 8.8
0%
Низкий
больше 2 лет назад

Уязвимостей на страницу