CVE-2023-32140
HIGHDlink Dap-1360 Firmware < 6.15eub01 - Heap Buffer Overflow
Title source: ruleDescription
D-Link DAP-1360 webproc var:sys_Token Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DAP-1360 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling requests to the /cgi-bin/webproc endpoint. When parsing the var:sys_Token parameter, the process does not properly validate the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. . Was ZDI-CAN-18418.
References (2)
Core 2
Core References
Patch x_research-advisory
https://www.zerodayinitiative.com/advisories/ZDI-23-532/
Patch, Vendor Advisory vendor-advisory
https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10324
Scores
CVSS v3
7.5
EPSS
0.0075
EPSS Percentile
73.3%
Attack Vector
ADJACENT_NETWORK
CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
total
Details
CWE
CWE-121
CWE-122
Status
published
Products (2)
dlink/dap-1360_firmware
< 6.15eub01
dlink/dap-2020_firmware
< 1.03rc004
Published
May 03, 2024
Tracked Since
Feb 18, 2026