[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"all-banners":3,"SkipToContent_34xgpJIRRkpiT6ls6jE4NHf7VpvQCQBEwi69exi4oT0":4,"FooterNav_JsYsxvLufb1W12aeknKZ89on0MD0bNDTiB5EYxyxmU":11,"FooterSocial_u16tCafBUeGMoDrdLfTINytP2JB5msc6iB3VDUutAoU":17,"vulnerability-19837":24},[],["Island",5],{"key":6,"params":7,"result":9},"SkipToContent_34xgpJIRRkpiT6ls6jE4NHf7VpvQCQBEwi69exi4oT0",{"props":8},"{}",{"head":10},{},["Island",12],{"key":13,"params":14,"result":15},"FooterNav_JsYsxvLufb1W12aeknKZ89on0MD0bNDTiB5EYxyxmU",{"props":8},{"head":16},{},["Island",18],{"key":19,"params":20,"result":22},"FooterSocial_u16tCafBUeGMoDrdLfTINytP2JB5msc6iB3VDUutAoU",{"props":21},"{\"text-color\":\"gray\"}",{"head":23},{},{"id":25,"detectable_with":26,"vuln_details":33,"vuln_id":53,"name":54,"published":55,"updated":34},19837,{"tool":27,"engine":30},{"id":28,"name":29},1,"Network Scanner",{"id":31,"name":32},3,"OpenVAS",{"id":25,"codename":34,"description":34,"severity":35,"risk_description":36,"public_description":37,"public_recommendation":38,"recommendation":34,"references":39,"cvssv3":44,"epss_score":45,"epss_percentile":46,"cve":47,"in_cisa_catalog":51,"date":52,"software_type":34,"vendor":34,"product":34,"ptt_exploit_capabilities":34},null,"critical","The Mirai BotNet variant MooBot leverages several vulnerabilities to compromise D-Link devices. Note: This VT initially also included CVE-2022-28958 but as described in the references it turned out to be an invalid vulnerability which doesnt exist.","D-Link DAP-1522 devices are prone to multiple vulnerabilities.","No solution was made available by the vendor. General solution options are to upgrade to a newer release, disable respective features, remove the product or replace the product by another one. Note: Vendor states that DAP-1522 devices reached their End-of-Support Date, they are no longer supported, and firmware development has ceased. See vendor advisory for further recommendations.",[40,41,42,43],"https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10302","https://unit42.paloaltonetworks.com/moobot-d-link-devices/","https://vulncheck.com/blog/moobot-uses-fake-vulnerability","https://www.cisa.gov/known-exploited-vulnerabilities-catalog",9.8,0.94294,0.99943,[48,49,50],"CVE-2015-2051","CVE-2018-6530","CVE-2022-26258",true,"2015-02-23T00:00:00Z","NETSCAN-OPENVAS-1.3.6.1.4.1.25623.1.0.170478","D-Link DAP-1522 Devices Multiple Vulnerabilities (Sep 2022)","2023-05-23T00:00:00Z"]