{ "schema_version": "1.4.0", "id": "GHSA-82f7-mq8m-2w9x", "modified": "2022-05-24T17:24:03Z", "published": "2022-05-24T17:24:03Z", "aliases": [ "CVE-2020-15896" ], "details": "An authentication-bypass issue was discovered on D-Link DAP-1522 devices 1.4x before 1.10b04Beta02. There exist a few pages that are directly accessible by any unauthorized user, e.g., logout.php and login.php. This occurs because of checking the value of NO_NEED_AUTH. If the value of NO_NEED_AUTH is 1, the user has direct access to the webpage without any authentication. By appending a query string NO_NEED_AUTH with the value of 1 to any protected URL, any unauthorized user can access the application directly, as demonstrated by bsc_lan.php?NO_NEED_AUTH=1.", "severity": [], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15896" }, { "type": "WEB", "url": "https://research.loginsoft.com/bugs/authentication-bypass-in-d-link-firmware-dap-1522" }, { "type": "WEB", "url": "https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10169" } ], "database_specific": { "cwe_ids": [], "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2020-07-22T19:15:00Z" } }