Lucene search

K
zdiDmitry "InfoSecDJ" Janushkevich of Trend Micro Zero Day InitiativeZDI-23-538
HistoryMay 04, 2023 - 12:00 a.m.

D-Link DAP-1360 Multiple Parameters Stack-Based Buffer Overflow Remote Code Execution Vulnerability

2023-05-0400:00:00
Dmitry "InfoSecDJ" Janushkevich of Trend Micro Zero Day Initiative
www.zerodayinitiative.com
19
d-link dap-1360
buffer overflow
remote code execution
authentication bypass
/cgi-bin/webproc endpoint
stack-based buffer
root access

EPSS

0.001

Percentile

16.2%

This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DAP-1360 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the /cgi-bin/webproc endpoint. When parsing the errorpage and nextpage parameters, the process does not properly validate the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root.

EPSS

0.001

Percentile

16.2%