CVE-2022-36785: Information Disclosure & Authorization Bypass. in D-Link G integrated Access Device4
D-Link – G integrated Access Device4 Information Disclosure & Authorization Bypass. *Information Disclosure – file contains a URL with private IP at line 15 "login.asp" A. The window.location.href = http://192.168.1.1/setupWizard.asp" http://192.168.1.1/setupWizard.asp" ; "admin" – contains default username value "login.asp" B. While accessing the web interface, the login form at *Authorization Bypass – URL by "setupWizard.asp' while it blocks direct access to – the web interface does not properly validate user identity variables values located at the client side, it is available to access it without a "login_glag" and "login_status" checking browser and to read the admin user credentials for the web interface.
AI Analysis
Technical Summary
CVE-2022-36785 is a high-severity vulnerability affecting all versions of the D-Link G integrated Access Device4. The vulnerability involves two primary issues: information disclosure and authorization bypass. The information disclosure aspect arises from the device's web interface code, which contains hardcoded URLs pointing to private IP addresses (e.g., http://192.168.1.1/setupWizard.asp) and default credentials such as the username "admin" embedded within the login page (login.asp). This exposure can aid attackers in reconnaissance and facilitate unauthorized access attempts. The more critical issue is the authorization bypass vulnerability. The device's web interface improperly validates user identity by relying on client-side variables such as "login_flag" and "login_status" to control access. Because these checks are performed on the client side and not enforced server-side, an attacker can directly access privileged URLs like "setupWizard.asp" without proper authentication. This allows unauthorized users to read administrative credentials and potentially gain control over the device's management interface. The vulnerability is remotely exploitable over the network without requiring any privileges or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The impact is primarily on confidentiality, as unauthorized disclosure of admin credentials can lead to further compromise. The vulnerability is classified under CWE-863 (Incorrect Authorization). No patches or known exploits in the wild have been reported as of the publication date (November 17, 2022).
Potential Impact
For European organizations, this vulnerability poses a significant risk to network security and operational integrity. The D-Link G integrated Access Device4 is typically used as an access device or gateway, often deployed in small to medium-sized enterprises, branch offices, or residential environments. Exploitation could allow attackers to bypass authentication controls and obtain administrative credentials, enabling them to modify device configurations, intercept or redirect network traffic, or establish persistent footholds within the network. This could lead to data breaches, unauthorized surveillance, or disruption of network services. Given the device's role in network access, compromise could also facilitate lateral movement to other critical infrastructure components. The lack of required authentication and user interaction makes exploitation straightforward for remote attackers, increasing the likelihood of successful attacks. European organizations relying on these devices without proper compensating controls are at elevated risk, especially those in sectors with stringent data protection requirements such as finance, healthcare, and critical infrastructure. Additionally, the exposure of default credentials and weak authorization controls may violate compliance mandates like GDPR if personal data confidentiality is compromised.
Mitigation Recommendations
1. Immediate mitigation should include restricting access to the device's web management interface to trusted networks only, such as internal LAN segments or VPNs, to prevent exposure to untrusted networks or the internet. 2. Change all default credentials immediately; ensure strong, unique passwords are set for all administrative accounts. 3. Disable remote management features if not strictly necessary, or restrict them using IP whitelisting and strong authentication mechanisms. 4. Monitor network traffic for unusual access patterns to the device's management URLs, especially attempts to access setupWizard.asp or login.asp without proper authentication. 5. Implement network segmentation to isolate access devices from critical systems to limit potential lateral movement in case of compromise. 6. Since no official patch is currently available, consider replacing the affected devices with models that have confirmed security updates or vendor support. 7. Employ intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics to detect attempts to exploit this vulnerability. 8. Regularly audit device configurations and firmware versions to identify vulnerable devices and maintain an up-to-date asset inventory. 9. Engage with D-Link support channels to obtain information on upcoming patches or firmware updates addressing this vulnerability.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2022-36785: Information Disclosure & Authorization Bypass. in D-Link G integrated Access Device4
Description
D-Link – G integrated Access Device4 Information Disclosure & Authorization Bypass. *Information Disclosure – file contains a URL with private IP at line 15 "login.asp" A. The window.location.href = http://192.168.1.1/setupWizard.asp" http://192.168.1.1/setupWizard.asp" ; "admin" – contains default username value "login.asp" B. While accessing the web interface, the login form at *Authorization Bypass – URL by "setupWizard.asp' while it blocks direct access to – the web interface does not properly validate user identity variables values located at the client side, it is available to access it without a "login_glag" and "login_status" checking browser and to read the admin user credentials for the web interface.
AI-Powered Analysis
Technical Analysis
CVE-2022-36785 is a high-severity vulnerability affecting all versions of the D-Link G integrated Access Device4. The vulnerability involves two primary issues: information disclosure and authorization bypass. The information disclosure aspect arises from the device's web interface code, which contains hardcoded URLs pointing to private IP addresses (e.g., http://192.168.1.1/setupWizard.asp) and default credentials such as the username "admin" embedded within the login page (login.asp). This exposure can aid attackers in reconnaissance and facilitate unauthorized access attempts. The more critical issue is the authorization bypass vulnerability. The device's web interface improperly validates user identity by relying on client-side variables such as "login_flag" and "login_status" to control access. Because these checks are performed on the client side and not enforced server-side, an attacker can directly access privileged URLs like "setupWizard.asp" without proper authentication. This allows unauthorized users to read administrative credentials and potentially gain control over the device's management interface. The vulnerability is remotely exploitable over the network without requiring any privileges or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The impact is primarily on confidentiality, as unauthorized disclosure of admin credentials can lead to further compromise. The vulnerability is classified under CWE-863 (Incorrect Authorization). No patches or known exploits in the wild have been reported as of the publication date (November 17, 2022).
Potential Impact
For European organizations, this vulnerability poses a significant risk to network security and operational integrity. The D-Link G integrated Access Device4 is typically used as an access device or gateway, often deployed in small to medium-sized enterprises, branch offices, or residential environments. Exploitation could allow attackers to bypass authentication controls and obtain administrative credentials, enabling them to modify device configurations, intercept or redirect network traffic, or establish persistent footholds within the network. This could lead to data breaches, unauthorized surveillance, or disruption of network services. Given the device's role in network access, compromise could also facilitate lateral movement to other critical infrastructure components. The lack of required authentication and user interaction makes exploitation straightforward for remote attackers, increasing the likelihood of successful attacks. European organizations relying on these devices without proper compensating controls are at elevated risk, especially those in sectors with stringent data protection requirements such as finance, healthcare, and critical infrastructure. Additionally, the exposure of default credentials and weak authorization controls may violate compliance mandates like GDPR if personal data confidentiality is compromised.
Mitigation Recommendations
1. Immediate mitigation should include restricting access to the device's web management interface to trusted networks only, such as internal LAN segments or VPNs, to prevent exposure to untrusted networks or the internet. 2. Change all default credentials immediately; ensure strong, unique passwords are set for all administrative accounts. 3. Disable remote management features if not strictly necessary, or restrict them using IP whitelisting and strong authentication mechanisms. 4. Monitor network traffic for unusual access patterns to the device's management URLs, especially attempts to access setupWizard.asp or login.asp without proper authentication. 5. Implement network segmentation to isolate access devices from critical systems to limit potential lateral movement in case of compromise. 6. Since no official patch is currently available, consider replacing the affected devices with models that have confirmed security updates or vendor support. 7. Employ intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics to detect attempts to exploit this vulnerability. 8. Regularly audit device configurations and firmware versions to identify vulnerable devices and maintain an up-to-date asset inventory. 9. Engage with D-Link support channels to obtain information on upcoming patches or firmware updates addressing this vulnerability.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- INCD
- Date Reserved
- 2022-07-26T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d983dc4522896dcbeefe3
Added to database: 5/21/2025, 9:09:17 AM
Last enriched: 6/24/2025, 11:34:24 PM
Last updated: 8/15/2025, 11:33:45 PM
Views: 15
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.