D-Link DIR-3040 prog.cgi SetQuickVPNSettings Password Stack-Based Buffer Overflow Remote Code Execution Vulnerability
CVE-2023-41217
7.1HIGH
Summary
The D-Link DIR-3040 router is susceptible to a stack-based buffer overflow vulnerability due to inadequate validation of user-supplied strings within the prog.cgi binary. This flaw specifically impacts the handling of HNAP requests directed to the lighttpd webserver operating on TCP ports 80 and 443. Exploitation of this vulnerability enables an adjacent attacker to execute arbitrary code with root-level privileges, provided they have authenticated access. This situation underscores the importance of rigorous validation checks in network device software to mitigate potential threats.
Affected Version(s)
DIR-3040 120B03
References
CVSS V3.1
Score:
7.1
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Adjacent Network
Attack Complexity:
High
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved