D-Link DIR-X3260 prog.cgi SOAPAction Command Injection Remote Code Execution Vulnerability
CVE-2023-35723
8.8HIGH
Summary
A security vulnerability has been identified in D-Link DIR-X3260 routers, allowing potential exploitation by network-adjacent attackers. This flaw is related to the handling of the SOAPAction request header in the prog.cgi endpoint, where insufficient validation of a user-supplied string can lead to arbitrary code execution. An attacker with knowledge of this vulnerability can execute commands in the context of root, posing significant risks for the affected installations. No authentication is required to exploit this issue, making it critical for users to address this vulnerability promptly.
Affected Version(s)
DIR-X3260 1.02B02
References
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Adjacent Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved