D-Link DAP-1360 webproc var:page Stack-based Buffer Overflow Remote Code Execution Vulnerability
CVE-2023-32142

8.8HIGH

Key Information:

Vendor
D-link
Status
Vendor
CVE Published:
3 May 2024

Summary

A stack-based buffer overflow vulnerability exists in the D-Link DAP-1360 router, specifically within the handling of requests directed to the /cgi-bin/webproc endpoint. The flawed mechanism fails to adequately validate the length of the user-supplied data for the var:page parameter before copying it into a fixed-length stack-based buffer. This oversight allows network-adjacent attackers to exploit the vulnerability, leading to the execution of arbitrary code in the context of root privileges. This vulnerability can be exploited without requiring any form of authentication, thereby posing a significant risk to affected installations.

Affected Version(s)

DAP-1360 6.14B01 EU HOTFIX

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Adjacent Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.