Show plain JSON{"containers": {"cna": {"affected": [{"defaultStatus": "unaffected", "product": "G integrated Access Device4", "vendor": "D-Link", "versions": [{"lessThan": " Upgrade to the latest version.", "status": "affected", "version": "All versions", "versionType": "custom"}]}], "credits": [{"lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "MetaData"}], "descriptions": [{"lang": "en", "supportingMedia": [{"base64": false, "type": "text/html", "value": "\n\n<p>D-Link \u2013 G integrated Access Device4 Information Disclosure & Authorization Bypass.<br>*Information Disclosure \u2013 <br>file contains a URL with private IP at line 15 \"login.asp\" A. The<br>window.location.href =<a target=\"_blank\" rel=\"nofollow\" href=\"http://192.168.1.1/setupWizard.asp"\">http://192.168.1.1/setupWizard.asp\"</a>;<br>\"admin\" \u2013 contains default username value \"login.asp\" B. While accessing the web interface, the login form at </p><p>*Authorization Bypass \u2013 <br>URL by \"setupWizard.asp' while it blocks direct access to \u2013 the web interface does not properly validate user identity variables values located at the client side, it is available to access it without a \"login_glag\" and \"login_status\" checking browser and to read the admin user credentials for the web interface.</p>\n\n"}], "value": "\nD-Link \u2013 G integrated Access Device4 Information Disclosure & Authorization Bypass.\n*Information Disclosure \u2013 \nfile contains a URL with private IP at line 15 \"login.asp\" A. The\nwindow.location.href = http://192.168.1.1/setupWizard.asp\" http://192.168.1.1/setupWizard.asp\" ;\n\"admin\" \u2013 contains default username value \"login.asp\" B. While accessing the web interface, the login form at \n\n*Authorization Bypass \u2013 \nURL by \"setupWizard.asp' while it blocks direct access to \u2013 the web interface does not properly validate user identity variables values located at the client side, it is available to access it without a \"login_glag\" and \"login_status\" checking browser and to read the admin user credentials for the web interface.\n\n\n\n"}], "metrics": [{"cvssV3_1": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1"}, "format": "CVSS", "scenarios": [{"lang": "en", "value": "GENERAL"}]}], "problemTypes": [{"descriptions": [{"description": "Information Disclosure & Authorization Bypass.", "lang": "en"}]}], "providerMetadata": {"orgId": "a57ee1ae-c9c1-4f40-aa7b-cf10760fde3f", "shortName": "INCD", "dateUpdated": "2023-10-25T12:39:31.991Z"}, "references": [{"url": "https://www.gov.il/en/Departments/faq/cve_advisories"}], "source": {"advisory": "ILVN-2022-0056", "discovery": "UNKNOWN"}, "title": "D-Link \u2013 G integrated Access Device4 Information Disclosure & Authorization Bypass.", "x_generator": {"engine": "Vulnogram 0.1.0-dev"}}, "adp": [{"providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-03T10:14:28.416Z"}, "title": "CVE Program Container", "references": [{"url": "https://www.gov.il/en/Departments/faq/cve_advisories", "tags": ["x_transferred"]}]}, {"problemTypes": [{"descriptions": [{"type": "CWE", "cweId": "CWE-863", "lang": "en", "description": "CWE-863 Incorrect Authorization"}]}], "metrics": [{"other": {"type": "ssvc", "content": {"timestamp": "2025-04-29T13:41:09.297559Z", "id": "CVE-2022-36785", "options": [{"Exploitation": "none"}, {"Automatable": "yes"}, {"Technical Impact": "partial"}], "role": "CISA Coordinator", "version": "2.0.3"}}}], "title": "CISA ADP Vulnrichment", "providerMetadata": {"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP", "dateUpdated": "2025-04-29T13:43:47.629Z"}}]}, "cveMetadata": {"assignerOrgId": "a57ee1ae-c9c1-4f40-aa7b-cf10760fde3f", "cveId": "CVE-2022-36785", "serial": 1, "state": "PUBLISHED", "dateUpdated": "2025-04-29T13:43:47.629Z", "dateReserved": "2022-07-26T00:00:00.000Z", "datePublished": "2022-11-17T22:27:55.842Z", "assignerShortName": "INCD"}, "dataType": "CVE_RECORD", "dataVersion": "5.1"}