The exploit demonstrates multiple vulnerabilities in D-Link AP 3200, including unauthenticated wireless setting changes, plaintext credential storage, and weak cookie generation. The PoC script brute-forces the cookie value to retrieve the admin password.
Classification
Working Poc 95%
Attack Type
Auth Bypass | Info Leak
Target:
D-Link AP 3200 (and potentially other series like 8600, 7700, 2700)
No auth needed
Prerequisites:
Network access to the target device · Device must be running vulnerable firmware