D-Link.DGS-1510.Websmart.Authentication.Bypass
Description
This indicates an attack attempt to exploit an Authentication Bypass vulnerability in D-Link DGS-1510 Websmart Switch Series.
The vulnerability is caused by an improper validation of user supplied data when the vulnerable application handles a maliciously crafted request. An attacker can exploit this to bypass authentication process and gain unauthorized access to the affected application.
Affected Products
D-Link DGS-1510-28XMP with firmware before 1.31.B003
D-Link DGS-1510-28X with firmware before 1.31.B003
D-Link DGS-1510-52X with firmware before 1.31.B003
D-Link DGS-1510-52 with firmware before 1.31.B003
D-Link DGS-1510-28P with firmware before 1.31.B003
D-Link DGS-1510-28 with firmware before 1.31.B003
D-Link DGS-1510-20 with firmware before 1.31.B003
Impact
System Compromise: Remote attackers can gain control of vulnerable systems.
Recommended Actions
Apply the most recent upgrade or patch from the vendor
https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10070
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |