D-Link DAP-2622 DDP Set SSID List Missing Authentication Vulnerability. This vulnerability allows network-adjacent attackers to make unauthorized changes to device configuration on affected installations of D-Link DAP-2622 routers. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the DDP service. The issue results from the lack of authentication prior to allowing access to functionality. An attacker can leverage this vulnerability to manipulate wireless authentication settings.
. Was ZDI-CAN-20104.
References
Link | Resource |
---|---|
https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10349 | Vendor Advisory Product |
https://www.zerodayinitiative.com/advisories/ZDI-23-1280/ | Third Party Advisory |
https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10349 | Vendor Advisory Product |
https://www.zerodayinitiative.com/advisories/ZDI-23-1280/ | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
06 Aug 2025, 14:14
Type | Values Removed | Values Added |
---|---|---|
References | () https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10349 - Vendor Advisory, Product | |
References | () https://www.zerodayinitiative.com/advisories/ZDI-23-1280/ - Third Party Advisory | |
CPE | cpe:2.3:o:dlink:dap-2622_firmware:1.00:*:*:*:*:*:*:* cpe:2.3:h:dlink:dap-2622:-:*:*:*:*:*:*:* |
|
First Time |
Dlink dap-2622
Dlink Dlink dap-2622 Firmware |
21 Nov 2024, 08:11
Type | Values Removed | Values Added |
---|---|---|
References | () https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10349 - | |
References | () https://www.zerodayinitiative.com/advisories/ZDI-23-1280/ - |
18 Sep 2024, 19:15
Type | Values Removed | Values Added |
---|---|---|
Summary | (en) D-Link DAP-2622 DDP Set SSID List Missing Authentication Vulnerability. This vulnerability allows network-adjacent attackers to make unauthorized changes to device configuration on affected installations of D-Link DAP-2622 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the DDP service. The issue results from the lack of authentication prior to allowing access to functionality. An attacker can leverage this vulnerability to manipulate wireless authentication settings. . Was ZDI-CAN-20104. |
08 May 2024, 13:15
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
07 May 2024, 23:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-05-07 23:15
Updated : 2025-08-06 14:14
NVD link : CVE-2023-37325
Mitre link : CVE-2023-37325
CVE.ORG link : CVE-2023-37325
JSON object : View
Products Affected
dlink
- dap-2622
- dap-2622_firmware
CWE
CWE-306
Missing Authentication for Critical Function