An issue was discovered on D-Link DVA-5592 A1_WI_20180823 devices. If the PIN of the page "/ui/cbpc/login" is the default Parental Control PIN (0000), it is possible to bypass the login form by editing the path of the cookie "sid" generated by the page. The attacker will have access to the router control panel with administrator privileges.
References
Link | Resource |
---|---|
https://www.gubello.me/blog/router-dlink-dva-5592-authentication-bypass/ | Mitigation Third Party Advisory |
https://www.gubello.me/blog/router-dlink-dva-5592-authentication-bypass/ | Mitigation Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 03:54
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.gubello.me/blog/router-dlink-dva-5592-authentication-bypass/ - Mitigation, Third Party Advisory |
Information
Published : 2018-12-18 22:29
Updated : 2024-11-21 03:54
NVD link : CVE-2018-17777
Mitre link : CVE-2018-17777
CVE.ORG link : CVE-2018-17777
JSON object : View
Products Affected
dlink
- dva-5592_firmware
- dva-5592
CWE
CWE-287
Improper Authentication