Логотип exploitDog
bind:CVE-2022-43622
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2022-43622

Количество 3

Количество 3

nvd логотип

CVE-2022-43622

почти 3 года назад

This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DIR-1935 1.03 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of Login requests to the web management portal. When parsing the HNAP_AUTH header, the process does not properly validate the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-16139.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-94w7-67qp-92gp

почти 3 года назад

This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DIR-1935 1.03 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of Login requests to the web management portal. When parsing the HNAP_AUTH header, the process does not properly validate the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-16139.

CVSS3: 8.8
EPSS: Низкий
fstec логотип

BDU:2022-06867

больше 3 лет назад

Уязвимость реализации протокола Home Network Administration Protocol (HNAP) микропрограммного обеспечения маршрутизаторов D-Link DIR-1935, позволяющая нарушителю выполнить произвольный код

CVSS3: 8.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2022-43622

This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DIR-1935 1.03 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of Login requests to the web management portal. When parsing the HNAP_AUTH header, the process does not properly validate the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-16139.

CVSS3: 8.8
0%
Низкий
почти 3 года назад
github логотип
GHSA-94w7-67qp-92gp

This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DIR-1935 1.03 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of Login requests to the web management portal. When parsing the HNAP_AUTH header, the process does not properly validate the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-16139.

CVSS3: 8.8
0%
Низкий
почти 3 года назад
fstec логотип
BDU:2022-06867

Уязвимость реализации протокола Home Network Administration Protocol (HNAP) микропрограммного обеспечения маршрутизаторов D-Link DIR-1935, позволяющая нарушителю выполнить произвольный код

CVSS3: 8.8
0%
Низкий
больше 3 лет назад

Уязвимостей на страницу