D-Link DAP-1360 webproc WEB_DisplayPage Stack-based Buffer Overflow Remote Code Execution Vulnerability
CVE-2023-32141

8.8HIGH

Key Information:

Vendor
D-link
Status
Vendor
CVE Published:
3 May 2024

Summary

The D-Link DAP-1360 suffers from a stack-based buffer overflow due to improper validation of user input in requests sent to the /cgi-bin/webproc endpoint. This vulnerability allows network-adjacent attackers to send specially crafted requests that exploit the flawed handling of parameters, leading to arbitrary code execution in the context of the root user. Notably, authentication is not required, significantly increasing the risk of exploitation. Users of affected D-Link routers must take immediate action to mitigate potential security threats.

Affected Version(s)

DAP-1360 6.14B01 EU HOTFIX

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Adjacent Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.