An issue was discovered on D-Link DVA-5592 A1_WI_20180823 devices. If the PIN of the page "/ui/cbpc/login" is the default Parental Control PIN (0000), it is possible to bypass the login form by editing the path of the cookie "sid" generated by the page. The attacker will have access to the router control panel with administrator privileges.
                
            References
                    | Link | Resource | 
|---|---|
| https://www.gubello.me/blog/router-dlink-dva-5592-authentication-bypass/ | Mitigation Third Party Advisory | 
| https://www.gubello.me/blog/router-dlink-dva-5592-authentication-bypass/ | Mitigation Third Party Advisory | 
Configurations
                    Configuration 1 (hide)
| AND | 
 
 | 
History
                    No history.
Information
                Published : 2018-12-18 22:29
Updated : 2024-11-21 03:54
NVD link : CVE-2018-17777
Mitre link : CVE-2018-17777
CVE.ORG link : CVE-2018-17777
JSON object : View
Products Affected
                dlink
- dva-5592_firmware
- dva-5592
CWE
                
                    
                        
                        CWE-287
                        
            Improper Authentication
