提出 #769853: D-Link DNS-120/202L/315L/320/320L/320LW/321/322L/323/325/326/327L/340L/343/345/726-4/1100-4/1200-05/1550-04 up to 20260205 Authentication Bypass Issues情報

タイトルD-Link DNS-120/202L/315L/320/320L/320LW/321/322L/323/325/326/327L/340L/343/345/726-4/1100-4/1200-05/1550-04 up to 20260205 Authentication Bypass Issues
説明We identified an authentication bypass vulnerability in a recently released firmware of a D-Link NAS device. This vulnerability allows remote attackers to bypass authentication checks and gain unauthorized access via specially crafted requests.By abusing the cgi_set_wto interface, an attacker can modify the default admin account configuration to achieve persistent privileged access. After establishing this unauthorized persistence, the attacker can access arbitrary management interfaces, and further chain this vulnerability with other authenticated flaws, such as command injection or buffer overflow vulnerabilities, to ultimately gain full control of the device.
ソース⚠️ https://github.com/wudipjq/my_vuln/blob/main/D-Link8/vuln_96/96.md
ユーザー
 pjq123 (UID 86618)
送信2026年03月02日 09:52 (2 月 ago)
モデレーション2026年03月15日 09:22 (13 days later)
ステータス承諾済み
VulDBエントリ351106 [D-Link DNS-1550-04 迄 20260205 /cgi-bin/system_mgr.cgi cgi_set_wto 特権昇格]
ポイント20

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!