D-Link DIR-2150 SetTriggerPPPoEValidate Username Command Injection Remote Code Execution Vulnerability
CVE-2023-34276

8HIGH

Key Information:

Vendor
D-link
Status
Vendor
CVE Published:
3 May 2024

Summary

The D-Link DIR-2150 router is susceptible to a command injection vulnerability that enables network-adjacent attackers to execute arbitrary code. This arises from an insufficient validation of user-supplied input within the SOAP API interface, which listens on TCP port 80 by default. Even though authentication is necessary to exploit this flaw, the mechanism can be bypassed, making it feasible for an attacker to gain unauthorized code execution in the context of root privileges. Organizations using affected versions are advised to assess their security practices and prioritize updates to mitigate potential risks.

Affected Version(s)

DIR-2150 1.05B01

References

CVSS V3.1

Score:
8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Adjacent Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.