D-Link DAP-1360 webproc Heap-based Buffer Overflow Remote Code Execution Vulnerability
CVE-2023-32138

7.5HIGH

Key Information:

Vendor
D-link
Status
Vendor
CVE Published:
3 May 2024

Summary

A buffer overflow vulnerability exists in D-Link DAP-1360 routers, specifically within the handling of requests directed to the /cgi-bin/webproc endpoint. This flaw stems from improper validation of the length of user-supplied data before it is copied into a fixed-length heap-based buffer. An attacker situated on the same network can exploit this vulnerability to execute arbitrary code with root privileges, potentially compromising device integrity and security. Exploitation is possible without requiring authentication, making it particularly concerning for users of affected models.

Affected Version(s)

DAP-1360 6.14B01 EU HOTFIX

References

CVSS V3.1

Score:
7.5
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Adjacent Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.
🍪 This website uses cookies, like every other website on the internet 😕 By using our website, you consent to the use of cookies.