D-Link DIR-3040 prog.cgi SetSysEmailSettings Stack-Based Buffer Overflow Remote Code Execution Vulnerability
CVE-2023-41220

6.8MEDIUM

Key Information:

Vendor
D-link
Status
Vendor
CVE Published:
3 May 2024

Summary

The vulnerability identified in D-Link DIR-3040 routers arises from a stack-based buffer overflow within the prog.cgi binary. This component processes HNAP requests via the lighttpd webserver running on TCP ports 80 and 443. A failure to validate a user-supplied string properly before copying it to a fixed-size buffer allows network-adjacent attackers with valid authentication to execute arbitrary code in the context of the root user. Exploitation of this flaw poses a serious risk to affected installations, necessitating prompt attention from users and network administrators.

Affected Version(s)

DIR-3040 120B03

References

CVSS V3.1

Score:
6.8
Severity:
MEDIUM
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Adjacent Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.