Advisory Details

February 21st, 2020

D-Link DAP-1330 HNAP Incorrect Implementation of Authentication Algorithm Authentication Bypass Vulnerability

ZDI-20-265
ZDI-CAN-9554

CVE ID CVE-2020-8861
CVSS SCORE 8.8, (AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
AFFECTED VENDORS D-Link
AFFECTED PRODUCTS DAP-1330
VULNERABILITY DETAILS

This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of D-Link DAP-1330 Wi-Fi range extenders. Authentication is not required to exploit this vulnerability.

The specific flaw exists within the handling of HNAP login requests. The issue results from the lack of proper handling of cookies. An attacker can leverage this vulnerability to execute arbitrary code on the router.

ADDITIONAL DETAILS D-Link has issued an update to correct this vulnerability. More details can be found at:
https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10155
DISCLOSURE TIMELINE
  • 2020-01-03 - Vulnerability reported to vendor
  • 2020-02-21 - Coordinated public release of advisory
CREDIT chung96vn - Security Researcher of VinCSS (Member of Vingroup)
BACK TO ADVISORIES