إرسال #769853: D-Link DNS-120/202L/315L/320/320L/320LW/321/322L/323/325/326/327L/340L/343/345/726-4/1100-4/1200-05/1550-04 up to 20260205 Authentication Bypass Issuesالمعلومات

عنوانD-Link DNS-120/202L/315L/320/320L/320LW/321/322L/323/325/326/327L/340L/343/345/726-4/1100-4/1200-05/1550-04 up to 20260205 Authentication Bypass Issues
الوصفWe identified an authentication bypass vulnerability in a recently released firmware of a D-Link NAS device. This vulnerability allows remote attackers to bypass authentication checks and gain unauthorized access via specially crafted requests.By abusing the cgi_set_wto interface, an attacker can modify the default admin account configuration to achieve persistent privileged access. After establishing this unauthorized persistence, the attacker can access arbitrary management interfaces, and further chain this vulnerability with other authenticated flaws, such as command injection or buffer overflow vulnerabilities, to ultimately gain full control of the device.
المصدر⚠️ https://github.com/wudipjq/my_vuln/blob/main/D-Link8/vuln_96/96.md
المستخدم
 pjq123 (UID 86618)
ارسال02/03/2026 09:52 AM (2 أشهر منذ)
الاعتدال15/03/2026 09:22 AM (13 days later)
الحالةتمت الموافقة
إدخال VulDB351106 [D-Link DNS-1550-04 حتى 20260205 /cgi-bin/system_mgr.cgi cgi_set_wto تجاوز الصلاحيات]
النقاط20

Want to stay up to date on a daily basis?

Enable the mail alert feature now!