Loading HuntDB...

GHSA-542p-5xcv-3275

GitHub Security Advisory

⚠ Unreviewed HIGH Has CVE

Advisory Details

D-Link DAP-2622 Telnet CLI Use of Hardcoded Credentials Authentication Bypass Vulnerability. This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of D-Link DAP-2622 routers. Authentication is not required to exploit this vulnerability.

The specific flaw exists within the CLI service, which listens on TCP port 23. The server program contains hard-coded credentials. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-20050.

Related CVEs

Key Information

GHSA ID
GHSA-542p-5xcv-3275
Published
May 3, 2024 3:30 AM
Last Modified
May 3, 2024 3:30 AM
CVSS Score
7.5 /10
Primary Ecosystem
Unknown
Primary Package
Unknown
GitHub Reviewed
✗ No

Dataset

Last updated: June 18, 2025 6:25 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.