D-Link DWM-222W CVE-2026-6947

| EUVD-2026-25395 HIGH
Improper Restriction of Excessive Authentication Attempts (CWE-307)
2026-04-24 twcert GHSA-j7j4-xj8f-m78g
8.7
CVSS 4.0
Share

CVSS VectorNVD

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
X

Lifecycle Timeline

4
Re-analysis Queued
Apr 24, 2026 - 14:52 vuln.today
cvss_changed
Patch available
Apr 24, 2026 - 05:31 EUVD
Analysis Generated
Apr 24, 2026 - 04:31 vuln.today
CVSS changed
Apr 24, 2026 - 04:22 NVD
7.5 (HIGH) 8.7 (HIGH)

DescriptionNVD

DWM-222W USB Wi-Fi Adapter developed by D-Link has a Brute-Force Protection Bypass vulnerability, allowing unauthenticated adjacent network attackers to bypass login attempt limits to perform brute-force attacks to gain control over the device.

AnalysisAI

Brute-force protection bypass in D-Link DWM-222W USB Wi-Fi Adapter allows remote unauthenticated attackers to perform unlimited authentication attempts against the device's login interface. The vulnerability eliminates rate limiting controls, enabling adversaries to systematically guess credentials until device takeover is achieved. …

Sign in for full analysis, threat intelligence, and remediation guidance.

RemediationAI

Within 24 hours: Identify and document all D-Link DWM-222W adapters in use across the organization (endpoints, remote workers, network infrastructure). Within 7 days: Isolate affected devices from production networks or disable remote management interfaces if operationally feasible; implement network-level access controls restricting login attempts to the adapter's management interface. …

Sign in for detailed remediation steps.

Share

CVE-2026-6947 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy