Advisory Details

July 20th, 2020

D-Link DIR-842 HNAP GetCAPTCHAsetting Authentication Bypass Vulnerability

ZDI-20-880
ZDI-CAN-10083

CVE ID CVE-2020-15632
CVSS SCORE 8.8, (AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
AFFECTED VENDORS D-Link
AFFECTED PRODUCTS DIR-842
VULNERABILITY DETAILS

This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of D-Link DIR-842 routers. Authentication is not required to exploit this vulnerability.

The specific flaw exists within the processing of HNAP GetCAPTCHAsetting requests. The issue results from the lack of proper handling of sessions. An attacker can leverage this vulnerability to execute arbitrary code in the context of the device.

ADDITIONAL DETAILS D-Link has issued an update to correct this vulnerability. More details can be found at:
https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10184
DISCLOSURE TIMELINE
  • 2020-03-15 - Vulnerability reported to vendor
  • 2020-07-20 - Coordinated public release of advisory
CREDIT chung96vn - Security Researcher of VinCSS (Member of Vingroup)
BACK TO ADVISORIES