CVE-2022-43622
CVSS V2 None
CVSS V3 None
Description
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DIR-1935 1.03 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of Login requests to the web management portal. When parsing the HNAP_AUTH header, the process does not properly validate the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-16139.
Overview
- CVE ID
- CVE-2022-43622
- Assigner
- zdi-disclosures@trendmicro.com
- Vulnerability Status
- Analyzed
- Published Version
- 2023-03-29T19:15:19
- Last Modified Date
- 2023-04-06T15:07:03
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
AND | ||||
cpe:2.3:o:d-link:dir-1935_firmware:*:*:*:*:*:*:*:* | 1 | OR | 1.02 | |
cpe:2.3:o:d-link:dir-1935_firmware:1.03:b1:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:o:d-link:dir-1935_firmware:1.03:b2:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:h:d-link:dir-1935:-:*:*:*:*:*:*:* | 0 | OR |
References
Reference URL | Reference Tags |
---|---|
https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10310 | Patch Vendor Advisory |
https://www.zerodayinitiative.com/advisories/ZDI-22-1491/ | Third Party Advisory VDB Entry |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2022-43622 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43622 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2023-04-17 03:51:50 | Added to TrackCVE | |||
2023-04-17 03:51:53 | Weakness Enumeration | new | ||
2023-04-17 05:06:28 | CVSS V3 information | new |