// For flags

CVE-2022-36785

D-Link – G integrated Access Device4 Information Disclosure & Authorization Bypass.

Severity Score

7.5
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

D-Link – G integrated Access Device4 Information Disclosure & Authorization Bypass.
*Information Disclosure
file contains a URL with private IP at line 15 "login.asp" A. The
window.location.href = http://192.168.1.1/setupWizard.asp" http://192.168.1.1/setupWizard.asp" ;
"admin" – contains default username value "login.asp" B. While accessing the web interface, the login form at

*Authorization Bypass –
URL by "setupWizard.asp' while it blocks direct access to – the web interface does not properly validate user identity variables values located at the client side, it is available to access it without a "login_glag" and "login_status" checking browser and to read the admin user credentials for the web interface.

D-Link G integrated Access Device4 Information Disclosure & Authorization Bypass. El archivo Information Disclosure contiene una URL con IP privada en la línea 15 "login.asp" A. El window.location.href = http://192.168.1.1/setupWizard.asp" http://192.168.1.1/setupWizard.asp"; "administrador"? contiene el valor de nombre de usuario predeterminado "login.asp" B. Al acceder a la interfaz web, el formulario de inicio de sesión en *Authorization Bypass - URL por "setupWizard.asp' mientras bloquea el acceso directo a la interfaz web no valida correctamente los valores de las variables de identidad del usuario ubicadas en el lado del cliente, está disponible para acceder sin un navegador de verificación "login_glag" y "login_status" y para lea las credenciales del usuario administrador para la interfaz web.

*Credits: MetaData
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2022-07-26 CVE Reserved
  • 2022-11-17 CVE Published
  • 2024-06-09 EPSS Updated
  • 2024-08-03 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-863: Incorrect Authorization
CAPEC
References (1)
URL Tag Source
https://www.gov.il/en/Departments/faq/cve_advisories Third Party Advisory
URL Date SRC
URL Date SRC
URL Date SRC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Dlink
Search vendor "Dlink"
G Integrated Access Device4 Firmware
Search vendor "Dlink" for product "G Integrated Access Device4 Firmware"
1.0
Search vendor "Dlink" for product "G Integrated Access Device4 Firmware" and version "1.0"
-
Affected
in Dlink
Search vendor "Dlink"
G Integrated Access Device4
Search vendor "Dlink" for product "G Integrated Access Device4"
--
Safe