D-Link DIR-3040 HTTP Request Processing Referer Stack-Based Buffer Overflow Remote Code Execution Vulnerability
CVE-2023-41230

7.5HIGH

Key Information:

Vendor
D-link
Status
Vendor
CVE Published:
3 May 2024

Summary

The D-Link DIR-3040 router is subject to a vulnerability that allows network-adjacent attackers to perform remote code execution. This flaw is traced to the prog.cgi binary responsible for processing HNAP (Home Network Administration Protocol) requests on the lighttpd webserver. It arises from improper validation of input strings, which can lead attackers to exploit a stack-based buffer overflow. As a result, they can execute arbitrary code with root privileges, leading to unauthorized control over affected devices without requiring authentication.

Affected Version(s)

DIR-3040 120B03

References

CVSS V3.1

Score:
7.5
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Adjacent Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.