D-Link DAP-2622 DDP Set IPv6 Address Default Gateway Stack-based Buffer Overflow Remote Code Execution Vulnerability
CVE-2023-37316

8.8HIGH

Key Information:

Vendor
D-link
Status
Vendor
CVE Published:
3 May 2024

Summary

The vulnerability in D-Link DAP-2622 routers arises from a stack-based buffer overflow occurring within the DDP service due to inadequate validation of user-supplied input lengths. As a result, network-adjacent attackers can manipulate this flaw to execute arbitrary code with root privileges on affected installations. The absence of authentication requirements for exploitation heightens the risk, allowing potential attackers to leverage this vulnerability without prior access. Proper security measures are essential for mitigating the impact of this vulnerability, as it poses a significant threat to network integrity.

Affected Version(s)

DAP-2622 1.00 dated 16-12-2020

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Adjacent Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.