Lucene search

K
cve[email protected]CVE-2022-43648
HistoryMar 29, 2023 - 7:15 p.m.

CVE-2022-43648

2023-03-2919:15:21
CWE-122
web.nvd.nist.gov
16
cve-2022-43648
d-link dir-3040
arbitrary code execution
authentication bypass
minidlna service
heap-based buffer
zdi-can-19910
nvd

8.8 High

CVSS3

Attack Vector

ADJACENT

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.001 Low

EPSS

Percentile

35.4%

This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DIR-3040 1.20B03 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the MiniDLNA service. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the MiniDLNA service. Was ZDI-CAN-19910.

Affected configurations

Vulners
NVD
Node
d-linkdir-100Range1.20

CNA Affected

[
  {
    "vendor": "D-Link",
    "product": "DIR-3040",
    "versions": [
      {
        "version": "1.20B03",
        "status": "affected"
      }
    ]
  }
]

8.8 High

CVSS3

Attack Vector

ADJACENT

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.001 Low

EPSS

Percentile

35.4%

Related for CVE-2022-43648