TWCERT warns of brute-force protection bypass in D-Link DWM-222W Wi‑Fi 6 USB modem; firmware update available

Answer Brief

Taiwan’s TWCERT/CC published a high-severity vulnerability notice for the D-Link DWM-222W Wi‑Fi 6 USB mobile network adapter/modem. The issue allows an unauthenticated attacker on the same network domain to bypass login attempt limits, enabling brute-force attempts that could lead to device control. D-Link firmware 1.02.00 and later is listed as the fix.

Abstract diagram of an edge network device with a highlighted authentication risk signal and heatmap, representing a brute-force protection bypass vulnerability.

Executive Summary: Taiwan’s TWCERT/CC published a high-severity vulnerability notice for the D-Link DWM-222W Wi‑Fi 6 USB mobile network adapter/modem. The issue allows an unauthenticated attacker on the same network domain to bypass login attempt limits, enabling brute-force attempts that could lead to device control. D-Link firmware 1.02.00 and later is listed as the fix.

Why It Matters

TWCERT/CC’s notice describes a brute-force protection bypass in D-Link’s DWM-222W Wi‑Fi 6 USB mobile network device. The core security signal is not a traditional credential leak, but the failure of a defensive control—login attempt limiting—allowing repeated password guessing that would otherwise be throttled. According to the advisory, exploitation requires no prior authentication and is possible by an attacker in the same network domain, which makes the issue especially relevant in shared environments (e.g., branch offices, temporary networks, or any setting where the device is reachable by other local users).

For global security and infrastructure teams, the Taiwan vulnerability disclosure ecosystem (TVN via TWCERT/CC) often surfaces product issues that may be under-tracked outside the region, particularly for commodity networking and access devices. These devices frequently sit at the edge of enterprise networks or are used for backup connectivity, so weaknesses in their management interfaces can translate into broader operational risk (unauthorized configuration changes, routing/DNS manipulation, or service misuse). TWCERT/CC rates the issue High (CVSS 7.5) with integrity impact noted, and recommends upgrading to firmware 1.02.00 or later.

The advisory credits the reporter as “Amoslai (開啟資安系統)” and provides the CVE reference. No additional exploitation details, IOCs, or in-the-wild confirmation are included in the TWCERT/CC posting.

Event Type: security
Importance: high

Affected Companies

  • D-Link (友訊科技)
  • TWCERT/CC (台灣電腦網路危機處理暨協調中心)

Affected Sectors

  • Consumer/SMB IT
  • Enterprise IT
  • Networking
  • Telecommunications

Key Numbers

  • TVN ID: TVN-202604010
  • CVE: CVE-2026-6947
  • CVSS v3.1: 7.5 (High)
  • Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
  • Affected versions: DWM-222W firmware earlier than 1.02.00
  • Fixed version: Firmware 1.02.00 or later
  • Public date (TWCERT/CC): 2026-04-24

Timeline

  1. TWCERT/CC publishes TVN-202604010 for CVE-2026-6947 affecting D-Link DWM-222W; recommends updating to firmware 1.02.00+.

Sources

Leave a Reply

Your email address will not be published. Required fields are marked *