D-Link DIR-X3260 prog.cgi Incorrect Implementation of Authentication Algorithm Authentication Bypass Vulnerability. This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of D-Link DIR-X3260 routers. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the prog.cgi executable. The issue results from an incorrect implementation of the authentication algorithm. An attacker can leverage this vulnerability to bypass authentication on the device. Was ZDI-CAN-21100.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://www.zerodayinitiative.com/advisories/ZDI-23-1518/ |
![]() ![]() ![]() |
History
Tue, 13 May 2025 14:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Dlink
Dlink dir-x3260 Dlink dir-x3260 Firmware |
|
Weaknesses | NVD-CWE-noinfo | |
CPEs | cpe:2.3:h:dlink:dir-x3260:-:*:*:*:*:*:*:* cpe:2.3:o:dlink:dir-x3260_firmware:*:*:*:*:*:*:*:* |
|
Vendors & Products |
Dlink
Dlink dir-x3260 Dlink dir-x3260 Firmware |
|
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: zdi
Published: 2024-05-03T02:13:49.140Z
Updated: 2024-08-02T20:07:33.133Z
Reserved: 2023-09-28T18:02:49.771Z
Link: CVE-2023-44420

Updated: 2024-08-02T20:07:33.133Z

Status : Analyzed
Published: 2024-05-03T03:15:56.057
Modified: 2025-05-13T14:05:38.300
Link: CVE-2023-44420

No data.