D-Link DAP-2622 DDP Set IPv6 Address Default Gateway Stack-based Buffer Overflow Remote Code Execution Vulnerability
CVE-2023-37316
8.8HIGH
Summary
The vulnerability in D-Link DAP-2622 routers arises from a stack-based buffer overflow occurring within the DDP service due to inadequate validation of user-supplied input lengths. As a result, network-adjacent attackers can manipulate this flaw to execute arbitrary code with root privileges on affected installations. The absence of authentication requirements for exploitation heightens the risk, allowing potential attackers to leverage this vulnerability without prior access. Proper security measures are essential for mitigating the impact of this vulnerability, as it poses a significant threat to network integrity.
Affected Version(s)
DAP-2622 1.00 dated 16-12-2020
References
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Adjacent Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved