U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2022-36785

Change History

CVE Modified by Israel National Cyber Directorate 10/25/2023 2:17:11 PM

Action Type Old Value New Value
Added CVSS V3.1

								
							
							
						
Israel National Cyber Directorate AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Removed CVSS V3.1
Israel National Cyber Directorate AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L

								
						
Removed CVSS V3.1 Reason
A-No availability impacts identified

								
						
Removed CVSS V3.1 Reason
AC-No Race Condition

								
						
Removed CVSS V3.1 Reason
AV-Lack of information

								
						
Removed CVSS V3.1 Reason
C-No limiting factors

								
						
Removed CVSS V3.1 Reason
I-No integrity impacts identified

								
						
Removed CVSS V3.1 Reason
PR-No privileges needed

								
						
Changed Description
D-Link – G integrated Access Device4 Information Disclosure & Authorization Bypass. *Information Disclosure – file contains a URL with private IP at line 15 "login.asp" A. The window.location.href = http://192.168.1.1/setupWizard.asp" http://192.168.1.1/setupWizard.asp" ; "admin" – contains default username value "login.asp" B. While accessing the web interface, the login form at *Authorization Bypass – URL by "setupWizard.asp' while it blocks direct access to – the web interface does not properly validate user identity variables values located at the client side, it is available to access it without a "login_glag" and "login_status" checking browser and to read the admin user credentials for the web interface.
D-Link – G integrated Access Device4 Information Disclosure & Authorization Bypass.
*Information Disclosure – 
file contains a URL with private IP at line 15 "login.asp" A. The
window.location.href = http://192.168.1.1/setupWizard.asp" http://192.168.1.1/setupWizard.asp" ;
"admin" – contains default username value "login.asp" B. While accessing the web interface, the login form at 

*Authorization Bypass – 
URL by "setupWizard.asp' while it blocks direct access to – the web interface does not properly validate user identity variables values located at the client side, it is available to access it without a "login_glag" and "login_status" checking browser and to read the admin user credentials for the web interface.