Arbitrary Code Execution Vulnerability in D-Link DIR-1935 Router
CVE-2022-43627
6.8MEDIUM
Summary
This vulnerability enables network-adjacent attackers to execute arbitrary code on affected installations of D-Link DIR-1935 routers. While authentication is usually required, it can be bypassed due to a flaw in the authentication mechanism. The issue occurs during the handling of SetStaticRouteIPv4Settings requests within the web management portal, where user-supplied strings are not properly validated before executing system calls. This oversight allows an attacker to execute code with root privileges, potentially compromising the entire system.
Affected Version(s)
DIR-1935 1.03
References
CVSS V3.1
Score:
6.8
Severity:
MEDIUM
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Adjacent Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Anonymous