D-Link.DGS-1510.Websmart.Authentication.Bypass

description-logoDescription

This indicates an attack attempt to exploit an Authentication Bypass vulnerability in D-Link DGS-1510 Websmart Switch Series.
The vulnerability is caused by an improper validation of user supplied data when the vulnerable application handles a maliciously crafted request. An attacker can exploit this to bypass authentication process and gain unauthorized access to the affected application.

affected-products-logoAffected Products

D-Link DGS-1510-28XMP with firmware before 1.31.B003
D-Link DGS-1510-28X with firmware before 1.31.B003
D-Link DGS-1510-52X with firmware before 1.31.B003
D-Link DGS-1510-52 with firmware before 1.31.B003
D-Link DGS-1510-28P with firmware before 1.31.B003
D-Link DGS-1510-28 with firmware before 1.31.B003
D-Link DGS-1510-20 with firmware before 1.31.B003

Impact logoImpact

System Compromise: Remote attackers can gain control of vulnerable systems.

recomended-action-logoRecommended Actions

Apply the most recent upgrade or patch from the vendor
https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10070

Telemetry logoTelemetry

Coverage

IPS (Regular DB)
IPS (Extended DB)

Version Updates

Date Version Detail
2021-05-10 18.075 Default_action:pass:drop
2021-04-29 18.070