Command Execution Vulnerability in D-Link DIR-2150 4.0.1 Router
CVE-2022-40719

8.8HIGH

Key Information:

Vendor
D-link
Status
Vendor
CVE Published:
26 January 2023

Summary

A command execution vulnerability exists in the D-Link DIR-2150 4.0.1 router, allowing network-adjacent attackers to execute arbitrary commands without authentication. This issue is due to insufficient validation of user-supplied input in the xupnpd_generic.lua plugin of the xupnpd service, which operates on TCP port 4044. Attackers can exploit this flaw by crafting a malicious request that triggers unauthorized system calls, potentially compromising the device and the network it connects to. Users are advised to apply available security updates promptly to mitigate this risk.

Affected Version(s)

DIR-2150 4.0.1

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Adjacent Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

CVSS V3.0

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Adjacent Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Anonymous
.