CVE-2023-35724
CVSS V2 None
CVSS V3 None
Description
D-Link DAP-2622 Telnet CLI Use of Hardcoded Credentials Authentication Bypass Vulnerability. This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of D-Link DAP-2622 routers. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the CLI service, which listens on TCP port 23. The server program contains hard-coded credentials. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-20050.
Overview
- CVE ID
- CVE-2023-35724
- Assigner
- zdi
- Vulnerability Status
- PUBLISHED
- Published Version
- 2024-05-03T01:57:44.650Z
- Last Modified Date
- 2024-06-05T19:47:46.215Z
Weakness Enumerations
References
Reference URL | Reference Tags |
---|---|
https://www.zerodayinitiative.com/advisories/ZDI-23-1230/ | x_research-advisory |
https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10349 | vendor-advisory |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2023-35724 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35724 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2024-06-25 19:43:18 | Added to TrackCVE |