D-Link DIR-X3260 prog.cgi SOAPAction Command Injection Remote Code Execution Vulnerability
CVE-2023-35723

8.8HIGH

Key Information:

Vendor
D-link
Status
Vendor
CVE Published:
3 May 2024

Summary

A security vulnerability has been identified in D-Link DIR-X3260 routers, allowing potential exploitation by network-adjacent attackers. This flaw is related to the handling of the SOAPAction request header in the prog.cgi endpoint, where insufficient validation of a user-supplied string can lead to arbitrary code execution. An attacker with knowledge of this vulnerability can execute commands in the context of root, posing significant risks for the affected installations. No authentication is required to exploit this issue, making it critical for users to address this vulnerability promptly.

Affected Version(s)

DIR-X3260 1.02B02

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Adjacent Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.