Stack-based Buffer Overflow Remote Code Execution Vulnerability in D-Link DAP-2622 Routers
CVE-2023-35749

8.8HIGH

Key Information:

Vendor
D-link
Status
Vendor
CVE Published:
7 May 2024

Summary

A vulnerability exists in the D-Link DAP-2622 routers due to improper validation of user-supplied data when handled by the DDP service. This flaw enables network-adjacent attackers to exploit the buffer overflow and execute arbitrary code with root privileges on the device. The lack of authentication requirements for exploitation increases the risk of this vulnerability, making affected installations particularly vulnerable to malicious attacks. It is crucial for users and administrators to address this issue promptly to prevent potential exploitation and unauthorized access.

Affected Version(s)

DAP-2622 1.00 dated 16-12-2020

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Adjacent Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.