Command Execution Vulnerability in D-Link DIR-2150 4.0.1 Router
CVE-2022-40719
8.8HIGH
Summary
A command execution vulnerability exists in the D-Link DIR-2150 4.0.1 router, allowing network-adjacent attackers to execute arbitrary commands without authentication. This issue is due to insufficient validation of user-supplied input in the xupnpd_generic.lua plugin of the xupnpd service, which operates on TCP port 4044. Attackers can exploit this flaw by crafting a malicious request that triggers unauthorized system calls, potentially compromising the device and the network it connects to. Users are advised to apply available security updates promptly to mitigate this risk.
Affected Version(s)
DIR-2150 4.0.1
References
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Adjacent Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
CVSS V3.0
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Adjacent Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Anonymous