CVE-2022-36785
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
17/11/2022
Last modified:
29/04/2025
Description
<br />
D-Link – G integrated Access Device4 Information Disclosure & Authorization Bypass.<br />
*Information Disclosure – <br />
file contains a URL with private IP at line 15 "login.asp" A. The<br />
window.location.href = http://192.168.1.1/setupWizard.asp" http://192.168.1.1/setupWizard.asp" ;<br />
"admin" – contains default username value "login.asp" B. While accessing the web interface, the login form at <br />
<br />
*Authorization Bypass – <br />
URL by "setupWizard.asp&#39; while it blocks direct access to – the web interface does not properly validate user identity variables values located at the client side, it is available to access it without a "login_glag" and "login_status" checking browser and to read the admin user credentials for the web interface.<br />
<br />
<br />
<br />
Impact
Base Score 3.x
7.50
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:dlink:g_integrated_access_device4_firmware:1.0:*:*:*:*:*:*:* | ||
| cpe:2.3:h:dlink:g_integrated_access_device4:-:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



