Vulnerability Details : CVE-2018-17777
An issue was discovered on D-Link DVA-5592 A1_WI_20180823 devices. If the PIN of the page "/ui/cbpc/login" is the default Parental Control PIN (0000), it is possible to bypass the login form by editing the path of the cookie "sid" generated by the page. The attacker will have access to the router control panel with administrator privileges.
Vulnerability category: BypassGain privilege
Products affected by CVE-2018-17777
- cpe:2.3:o:dlink:dva-5592_firmware:a1_wi_20180823:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2018-17777
0.29%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 64 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2018-17777
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST | |
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST |
CWE ids for CVE-2018-17777
-
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.Assigned by: nvd@nist.gov (Primary)
References for CVE-2018-17777
-
https://www.gubello.me/blog/router-dlink-dva-5592-authentication-bypass/
Router D-Link DVA-5592 - Authentication Bypass - Blog un po' nerdMitigation;Third Party Advisory
Jump to