Arbitrary Code Execution Vulnerability in D-Link DIR-825 Router
CVE-2022-43645
8.8HIGH
Summary
A vulnerability exists in the D-Link DIR-825 routers where attackers in close proximity can exploit the IVI plugin for the xupnpd service. The flaw is rooted in inadequate validation of user-supplied input, which can be used to execute arbitrary code on the device. This exploitation can occur without any authentication, enabling potential attackers to execute commands with the privileges of the admin user, posing a significant security risk.
Affected Version(s)
DIR-825 1.0.9
References
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Adjacent Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Dmitry "InfoSecDJ" Janushkevich of Trend Micro Zero Day Initiative