|Category:||Web application abuses|
|Title:||D-Link DAP-1522 Authentication Bypass Vulnerability (CVE-2020-15896)|
|Summary:||The D-Link DAP-1522 is prone to an authentication bypass vulnerability.|
The D-Link DAP-1522 is prone to an authentication bypass vulnerability.
here exist a few pages that are directly accessible by any unauthorized user,
e.g., logout.php and login.php. This occurs because of checking the value of NO_NEED_AUTH. If the value of
NO_NEED_AUTH is 1, the user has direct access to the webpage without any authentication. By appending a query
string NO_NEED_AUTH with the value of 1 to any protected URL, any unauthorized user can access the application
directly, as demonstrated by bsc_lan.php?NO_NEED_AUTH=1.
D-Link DAP-1522 devices. Other D-Link products might be affected as well.
See the referenced vendor advisory for a solution.
Common Vulnerability Exposure (CVE) ID: CVE-2020-15896|
|Copyright||Copyright (C) 2020 Greenbone Networks GmbH|
|This is only one of 85075 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.