D-Link DAP-2622 DDP Set IPv4 Address Auth Username Stack-based Buffer Overflow Remote Code Execution Vulnerability
CVE-2023-37313
8.8HIGH
Summary
The vulnerability in D-Link DAP-2622 routers arises from a stack-based buffer overflow in the DDP service, where the system fails to adequately validate the length of user-supplied input. This flaw allows attackers who are on the same network to send specially crafted requests, leading to the execution of arbitrary code within the context of the root user. As authentication is not necessary to exploit this issue, it poses a significant risk to the security and integrity of affected installations. Users are urged to apply necessary security updates and review their network configurations to mitigate potential attacks.
Affected Version(s)
DAP-2622 1.00 dated 16-12-2020
References
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Adjacent Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved