D-Link DAP-1325 HNAP SetHostIPv6StaticSettings StaticDNS2 Command Injection Remote Code Execution Vulnerability
CVE-2023-41199
8.8HIGH
Summary
A vulnerability has been identified in D-Link DAP-1325 routers, specifically in the handling of parameters sent to the HNAP1 SOAP endpoint. The vulnerability arises due to the inadequate validation of user-provided data, which can lead to arbitrary command execution. Attackers situated on the same network can exploit this flaw, enabling them to execute commands with root privileges on affected devices without needing authentication. This represents a significant security risk, potentially allowing unauthorized access and manipulation of sensitive systems.
Affected Version(s)
DAP-1325 1.07b01
References
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Adjacent Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved