D-Link DIR-2150 SetTriggerPPPoEValidate Username Command Injection Remote Code Execution Vulnerability
CVE-2023-34276
8HIGH
Summary
The D-Link DIR-2150 router is susceptible to a command injection vulnerability that enables network-adjacent attackers to execute arbitrary code. This arises from an insufficient validation of user-supplied input within the SOAP API interface, which listens on TCP port 80 by default. Even though authentication is necessary to exploit this flaw, the mechanism can be bypassed, making it feasible for an attacker to gain unauthorized code execution in the context of root privileges. Organizations using affected versions are advised to assess their security practices and prioritize updates to mitigate potential risks.
Affected Version(s)
DIR-2150 1.05B01
References
CVSS V3.1
Score:
8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Adjacent Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved