D-Link DAP-2622 DDP Auth Bypass Unauthorized SSID Config
CVE-2023-37325 Published on May 7, 2024
D-Link DAP-2622 DDP Set SSID List Missing Authentication Vulnerability
D-Link DAP-2622 DDP Set SSID List Missing Authentication Vulnerability. This vulnerability allows network-adjacent attackers to make unauthorized changes to device configuration on affected installations of D-Link DAP-2622 routers. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the DDP service. The issue results from the lack of authentication prior to allowing access to functionality. An attacker can leverage this vulnerability to manipulate wireless authentication settings.
. Was ZDI-CAN-20104.
Weakness Type
Missing Authentication for Critical Function
The software does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources.
Products Associated with CVE-2023-37325
Want to know whenever a new CVE is published for D-Link Dap 2622 Firmware? stack.watch will email you.
Affected Versions
D-Link DAP-2622:- Version 1.00 dated 16-12-2020 is affected.
- Before and including 1.00 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.