Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
D-Link DAP-2622 Telnet CLI Use of Hardcoded Credentials Authentication Bypass Vulnerability
Vulnerability Description
D-Link DAP-2622 Telnet CLI Use of Hardcoded Credentials Authentication Bypass Vulnerability. This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of D-Link DAP-2622 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the CLI service, which listens on TCP port 23. The server program contains hard-coded credentials. An attacker can leverage this vulnerability to bypass authentication on the system. . Was ZDI-CAN-20050.
CVSS Information
N/A
Vulnerability Type
使用硬编码的凭证
Vulnerability Title
D-Link DAP-2622 安全漏洞
Vulnerability Description
D-Link DAP-2622是中国友讯(D-Link)公司的一款无线接入点(Access Point)设备 D-Link DAP-2622 存在安全漏洞,该漏洞源于使用硬编码凭据身份验证绕过漏洞。
CVSS Information
N/A
Vulnerability Type
N/A