D-Link DAP-1650 SUBSCRIBE ‘Callback’ Command Injection Vulnerability
2024-1-26 07:40:16 Author: blog.exodusintel.com(查看原文) 阅读量:19 收藏

EIP-5a0f4b12

The D-Link DAP-1650 contains a command injection vulnerability in the ‘Callback’ parameter when handling UPnP SUBSCRIBE messages. An unauthenticated attacker can exploit this vulnerability to gain command execution on the device as root.

Vulnerability Identifier

  • Exodus Intelligence: EIP-5a0f4b12
  • MITRE: CVE-2024-23625

Vulnerability Metrics

  • CVSSv2 Vector: AV:A/AC:L/Au:N/C:C/I:C/A:C
  • CVSSv2 Score: 8.3

Vendor References

  • The affected product is end-of-life and no patches are available.
  • https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10266

Discovery Credit

  • Exodus Intelligence

Disclosure Timeline

  • Disclosed to Vendor: December 14, 2021
  • Vendor response to disclosure: January 27, 2022
  • Disclosed to public: January 25, 2024

Further Information

Readers of this advisory who are interested in receiving further details around the vulnerability, mitigations, detection guidance, and more can contact us at [email protected]


文章来源: https://blog.exodusintel.com/2024/01/25/d-link-dap-1650-subscribe-callback-command-injection-vulnerability/
如有侵权请联系:admin#unsafe.sh