|Category:||Web application abuses|
|Title:||D-Link DAP-1522 <= 1.42 Authentication Bypass Vulnerability|
|Summary:||D-Link DAP-1522 is prone to an authentication bypass vulnerability.|
D-Link DAP-1522 is prone to an authentication bypass vulnerability.
There exist a few pages that are directly accessible by any unauthorized user,
e.g., logout.php and login.php. This occurs because of checking the value of NO_NEED_AUTH. If the value of
NO_NEED_AUTH is 1, the user has direct access to the webpage without any authentication. By appending a query
string NO_NEED_AUTH with the value of 1 to any protected URL, any unauthorized user can access the application
directly, as demonstrated by bsc_lan.php?NO_NEED_AUTH=1.
D-Link DAP-1522 version 1.42 and prior.
No solution was made available by the vendor. General solution options are to
upgrade to a newer release, disable respective features, remove the product or replace the product by another one.
The vendor states: DAP-1522 (EOS: 07/01/2016) have reached its End-of-Support ('EOS') / End-of-Life ('EOL') Date.
As a general policy, when the product reaches EOS/EOL, it can no longer be supported, and all firmware
development for the product ceases, except in certain unique situations.
Common Vulnerability Exposure (CVE) ID: CVE-2020-15896|
|Copyright||Copyright (C) 2020 Greenbone Networks GmbH|
|This is only one of 85075 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.