D-Link DIR-2150 SetSysEmailSettings EmailFrom Command Injection Remote Code Execution Vulnerability
CVE-2023-34278
8HIGH
Summary
This vulnerability affects the D-Link DIR-2150 routers and is associated with improper handling of user-supplied data within the SOAP API interface. The flaw enables network-adjacent attackers to exploit the system by executing arbitrary code, potentially gaining root access. Despite requiring authentication for the exploit, the authentication mechanism is susceptible to bypass, making it easier for attackers to manipulate the system. By leveraging the lack of validation in the EmailFrom command settings, attackers can issue system calls that compromise the integrity of the router.
Affected Version(s)
DIR-2150 1.05B01
References
CVSS V3.1
Score:
8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Adjacent Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved