Lucene search

K
cve[email protected]CVE-2022-36786
HistoryNov 17, 2022 - 11:15 p.m.

CVE-2022-36786

2022-11-1723:15:17
CWE-77
web.nvd.nist.gov
36
6
cve-2022-36786
dlink
dsl-224
post-auth
rce
ntp
jsonrpc
api
security vulnerability

9.9 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

9.4 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

39.6%

DLINK - DSL-224 Post-auth RCE.
DLINK router version 3.0.8 has an interface where you can configure NTP servers (Network Time Protocol) via jsonrpc API.
It is possible to inject a command through this interface that will run with ROOT permissions on the router.

Affected configurations

NVD
Node
dlinkdsl-224_firmwareMatch-
AND
dlinkdsl-224Match-

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "DSL-224",
    "vendor": "D-Link",
    "versions": [
      {
        "lessThan": "Update to version 3.0.9_Beta Hotfix",
        "status": "affected",
        "version": "All versions",
        "versionType": "custom"
      }
    ]
  }
]

Social References

More

9.9 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

9.4 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

39.6%

Related for CVE-2022-36786