D-Link DAP-1325 SetHostIPv6StaticSettings StaticAddress Stack-based Buffer Overflow Remote Code Execution Vulnerability
CVE-2023-41207
8.8HIGH
Summary
The D-Link DAP-1325 router is vulnerable to a stack-based buffer overflow caused by improper handling of XML data at the HNAP1 SOAP endpoint. This security flaw enables network-adjacent attackers to execute arbitrary code on the device without the need for authentication. The exploitation occurs when an attacker provides overly long user-supplied data, leading to a scenario where the lack of validation allows the data to be copied into a fixed-length buffer, ultimately compromising the integrity of the device. This vulnerability has been cited as ZDI-CAN-18833 and requires urgent attention to mitigate potential risks.
Affected Version(s)
DAP-1325 1.07b01
References
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Adjacent Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved