Remote Code Execution Vulnerability in D-Link DIR-1935 Routers
CVE-2022-43625
6.8MEDIUM
Summary
This vulnerability in D-Link DIR-1935 routers allows network-adjacent attackers to execute arbitrary code through a flaw in the authentication mechanism. Attackers can exploit the vulnerability by sending malicious SetStaticRouteIPv4Settings requests to the web management portal. The process fails to validate the length of the user-supplied NetMask data, leading to a buffer overflow in a fixed-length stack-based buffer. As a result, an attacker could potentially execute code with root privileges on the affected system.
Affected Version(s)
DIR-1935 1.03
References
CVSS V3.1
Score:
6.8
Severity:
MEDIUM
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Adjacent Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Anonymous