D-Link DAP-1325 SetAPLanSettings SecondaryDNS Stack-based Buffer Overflow Remote Code Execution Vulnerability
CVE-2023-41204
8.8HIGH
Summary
The D-Link DAP-1325 router contains a security vulnerability that allows network-adjacent attackers to execute arbitrary code on vulnerable installations. This flaw is due to inadequate validation of the length of user-supplied XML data when processed by the HNAP1 SOAP endpoint. An attacker can exploit this vulnerability without the need for authentication, enabling execution of malicious code in the context of the root user, potentially compromising the integrity and security of the device. This issue highlights the importance of robust input validation and security measures in network devices.
Affected Version(s)
DAP-1325 1.07b01
References
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Adjacent Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved