D-Link DIR-2150 SetSysEmailSettings EmailFrom Command Injection Remote Code Execution Vulnerability
CVE-2023-34278

8HIGH

Key Information:

Vendor
D-link
Status
Vendor
CVE Published:
3 May 2024

Summary

This vulnerability affects the D-Link DIR-2150 routers and is associated with improper handling of user-supplied data within the SOAP API interface. The flaw enables network-adjacent attackers to exploit the system by executing arbitrary code, potentially gaining root access. Despite requiring authentication for the exploit, the authentication mechanism is susceptible to bypass, making it easier for attackers to manipulate the system. By leveraging the lack of validation in the EmailFrom command settings, attackers can issue system calls that compromise the integrity of the router.

Affected Version(s)

DIR-2150 1.05B01

References

CVSS V3.1

Score:
8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Adjacent Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.