Arbitrary Code Execution Vulnerability in D-Link DIR-1935 Router
CVE-2022-43627

6.8MEDIUM

Key Information:

Vendor
D-link
Status
Vendor
CVE Published:
29 March 2023

Summary

This vulnerability enables network-adjacent attackers to execute arbitrary code on affected installations of D-Link DIR-1935 routers. While authentication is usually required, it can be bypassed due to a flaw in the authentication mechanism. The issue occurs during the handling of SetStaticRouteIPv4Settings requests within the web management portal, where user-supplied strings are not properly validated before executing system calls. This oversight allows an attacker to execute code with root privileges, potentially compromising the entire system.

Affected Version(s)

DIR-1935 1.03

References

CVSS V3.1

Score:
6.8
Severity:
MEDIUM
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Adjacent Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Anonymous
.