D-Link DIR-3040 HTTP Request Processing Referer Stack-Based Buffer Overflow Remote Code Execution Vulnerability
CVE-2023-41230
7.5HIGH
Summary
The D-Link DIR-3040 router is subject to a vulnerability that allows network-adjacent attackers to perform remote code execution. This flaw is traced to the prog.cgi binary responsible for processing HNAP (Home Network Administration Protocol) requests on the lighttpd webserver. It arises from improper validation of input strings, which can lead attackers to exploit a stack-based buffer overflow. As a result, they can execute arbitrary code with root privileges, leading to unauthorized control over affected devices without requiring authentication.
Affected Version(s)
DIR-3040 120B03
References
CVSS V3.1
Score:
7.5
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Adjacent Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved