Search 187964 CVE descriptions
and 85075 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:
Category:Web application abuses
Title:D-Link DAP-1522 <= 1.42 Authentication Bypass Vulnerability
Summary:D-Link DAP-1522 is prone to an authentication bypass vulnerability.
D-Link DAP-1522 is prone to an authentication bypass vulnerability.

Vulnerability Insight:
There exist a few pages that are directly accessible by any unauthorized user,
e.g., logout.php and login.php. This occurs because of checking the value of NO_NEED_AUTH. If the value of
NO_NEED_AUTH is 1, the user has direct access to the webpage without any authentication. By appending a query
string NO_NEED_AUTH with the value of 1 to any protected URL, any unauthorized user can access the application
directly, as demonstrated by bsc_lan.php?NO_NEED_AUTH=1.

Affected Software/OS:
D-Link DAP-1522 version 1.42 and prior.

No solution was made available by the vendor. General solution options are to
upgrade to a newer release, disable respective features, remove the product or replace the product by another one.
The vendor states: DAP-1522 (EOS: 07/01/2016) have reached its End-of-Support ('EOS') / End-of-Life ('EOL') Date.
As a general policy, when the product reaches EOS/EOL, it can no longer be supported, and all firmware
development for the product ceases, except in certain unique situations.

CVSS Score:

CVSS Vector:

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2020-15896
CopyrightCopyright (C) 2020 Greenbone Networks GmbH

This is only one of 85075 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

© 1998-2020 E-Soft Inc. All rights reserved.