D-Link DAP-1325 HNAP SetHostIPv6StaticSettings StaticDNS2 Command Injection Remote Code Execution Vulnerability
CVE-2023-41199

8.8HIGH

Key Information:

Vendor
D-link
Status
Vendor
CVE Published:
3 May 2024

Summary

A vulnerability has been identified in D-Link DAP-1325 routers, specifically in the handling of parameters sent to the HNAP1 SOAP endpoint. The vulnerability arises due to the inadequate validation of user-provided data, which can lead to arbitrary command execution. Attackers situated on the same network can exploit this flaw, enabling them to execute commands with root privileges on affected devices without needing authentication. This represents a significant security risk, potentially allowing unauthorized access and manipulation of sensitive systems.

Affected Version(s)

DAP-1325 1.07b01

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Adjacent Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.