D-Link DIR-3040 prog.cgi SetSysEmailSettings Stack-Based Buffer Overflow Remote Code Execution Vulnerability
CVE-2023-41220
6.8MEDIUM
Summary
The vulnerability identified in D-Link DIR-3040 routers arises from a stack-based buffer overflow within the prog.cgi binary. This component processes HNAP requests via the lighttpd webserver running on TCP ports 80 and 443. A failure to validate a user-supplied string properly before copying it to a fixed-size buffer allows network-adjacent attackers with valid authentication to execute arbitrary code in the context of the root user. Exploitation of this flaw poses a serious risk to affected installations, necessitating prompt attention from users and network administrators.
Affected Version(s)
DIR-3040 120B03
References
CVSS V3.1
Score:
6.8
Severity:
MEDIUM
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Adjacent Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved