D-Link – G integrated Access Device4 Information Disclosure & Authorization Bypass.
*Information Disclosure –
file contains a URL with private IP at line 15 "login.asp" A. The
window.location.href = http://192.168.1.1/setupWizard.asp" http://192.168.1.1/setupWizard.asp" ;
"admin" – contains default username value "login.asp" B. While accessing the web interface, the login form at
*Authorization Bypass –
URL by "setupWizard.asp' while it blocks direct access to – the web interface does not properly validate user identity variables values located at the client side, it is available to access it without a "login_glag" and "login_status" checking browser and to read the admin user credentials for the web interface.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://www.gov.il/en/Departments/faq/cve_advisories |
History
No history.
MITRE
Status: PUBLISHED
Assigner: INCD
Published: 2022-11-17T22:27:55.842554Z
Updated: 2024-08-03T10:14:28.416Z
Reserved: 2022-07-26T00:00:00
Link: CVE-2022-36785
Vulnrichment
No data.
NVD
Status : Modified
Published: 2022-11-17T23:15:16.810
Modified: 2024-11-21T07:13:44.163
Link: CVE-2022-36785
Redhat
No data.