The default configuration of the device permits logging into it via the telnet service with hardcoded credentials.
D-Link DAP 1522 firmware and possibly other versions
This vulnerability allows an attacker to bypass certain security restrictions on the system, allowing the attacker to gain unauthorized access to the system.
BeyondTrust Prevention and Detection:
BeyondTrust's Retina® Network Security Scanner scans devices to detect for this vulnerability.
- 31711 - D-Link DAP 1522 Hardcoded Telnet Credentials (Zero-Day)
Disable telnet on affected devices. If telnet is required, block public access to the port used by the telnet service.