D-Link DIR-2150 GetDeviceSettings Target Command Injection Remote Code Execution Vulnerability
CVE-2023-34279
8.8HIGH
Summary
The D-Link DIR-2150 router is susceptible to a remote code execution vulnerability resulting from a command injection flaw in its SOAP API interface. This vulnerability does not require authentication, allowing network-adjacent attackers to execute arbitrary code on the router. The issue arises due to inadequate validation of user-supplied input before it is processed for execution. Attackers can exploit this weakness to gain root privileges on the affected devices, leading to potential compromise of network security and privacy. Organizations using the D-Link DIR-2150 should take immediate precautions to mitigate the risks associated with this vulnerability.
Affected Version(s)
DIR-2150 1.05B01
References
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Adjacent Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved