CVE-2018-17777

An issue was discovered on D-Link DVA-5592 A1_WI_20180823 devices. If the PIN of the page "/ui/cbpc/login" is the default Parental Control PIN (0000), it is possible to bypass the login form by editing the path of the cookie "sid" generated by the page. The attacker will have access to the router control panel with administrator privileges.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:dlink:dva-5592_firmware:a1_wi_20180823:*:*:*:*:*:*:*
cpe:2.3:h:dlink:dva-5592:-:*:*:*:*:*:*:*

History

21 Nov 2024, 03:54

Type Values Removed Values Added
References () https://www.gubello.me/blog/router-dlink-dva-5592-authentication-bypass/ - Mitigation, Third Party Advisory () https://www.gubello.me/blog/router-dlink-dva-5592-authentication-bypass/ - Mitigation, Third Party Advisory

Information

Published : 2018-12-18 22:29

Updated : 2024-11-21 03:54


NVD link : CVE-2018-17777

Mitre link : CVE-2018-17777

CVE.ORG link : CVE-2018-17777


JSON object : View

Products Affected

dlink

  • dva-5592_firmware
  • dva-5592
CWE
CWE-287

Improper Authentication