D-Link DAP-2622 DDP Get SSID List WPA PSK Information Disclosure Vulnerability. This vulnerability allows network-adjacent attackers to disclose sensitive information on affected installations of D-Link DAP-2622 routers. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the DDP service. The issue results from the lack of authentication prior to allowing access to functionality. An attacker can leverage this vulnerability to disclose stored credentials, leading to further compromise.
. Was ZDI-CAN-20078.
References
Link | Resource |
---|---|
https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10349 | Vendor Advisory Patch |
https://www.zerodayinitiative.com/advisories/ZDI-23-1255/ | Third Party Advisory |
https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10349 | Vendor Advisory Patch |
https://www.zerodayinitiative.com/advisories/ZDI-23-1255/ | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
13 May 2025, 13:54
Type | Values Removed | Values Added |
---|---|---|
First Time |
Dlink
Dlink dap-2622 Dlink dap-2622 Firmware |
|
CPE | cpe:2.3:o:dlink:dap-2622_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:dlink:dap-2622:-:*:*:*:*:*:*:* |
|
CWE | NVD-CWE-noinfo | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
References | () https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10349 - Vendor Advisory, Patch | |
References | () https://www.zerodayinitiative.com/advisories/ZDI-23-1255/ - Third Party Advisory |
21 Nov 2024, 08:08
Type | Values Removed | Values Added |
---|---|---|
References | () https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10349 - | |
References | () https://www.zerodayinitiative.com/advisories/ZDI-23-1255/ - |
18 Sep 2024, 19:15
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
Summary | (en) D-Link DAP-2622 DDP Get SSID List WPA PSK Information Disclosure Vulnerability. This vulnerability allows network-adjacent attackers to disclose sensitive information on affected installations of D-Link DAP-2622 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the DDP service. The issue results from the lack of authentication prior to allowing access to functionality. An attacker can leverage this vulnerability to disclose stored credentials, leading to further compromise. . Was ZDI-CAN-20078. |
03 May 2024, 02:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-05-03 02:15
Updated : 2025-05-13 13:54
NVD link : CVE-2023-35750
Mitre link : CVE-2023-35750
CVE.ORG link : CVE-2023-35750
JSON object : View
Products Affected
dlink
- dap-2622
- dap-2622_firmware
CWE