CVE-2023-41230

HIGH

D-Link DIR-3040 - RCE

Title source: llm

Description

D-Link DIR-3040 HTTP Request Processing Referer Stack-Based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DIR-3040 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the prog.cgi binary, which handles HNAP requests made to the lighttpd webserver listening on TCP ports 80 and 443. The issue results from the lack of proper validation of a user-supplied string before copying it to a fixed size stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-21674.

Scores

CVSS v3 8.8
EPSS 0.0078
EPSS Percentile 73.4%
Attack Vector ADJACENT_NETWORK
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Classification

CWE
CWE-121 CWE-787
Status published

Affected Products (1)

dlink/dir-3040_firmware < 1.20b03

Timeline

Published May 03, 2024
Tracked Since Feb 18, 2026