CVE-2022-43622Stack-based Buffer Overflow in Dlink Dir-1935 Firmware

Severity
8.8HIGHNVD
EPSS
1.1%
top 22.17%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 29

Description

This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DIR-1935 1.03 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of Login requests to the web management portal. When parsing the HNAP_AUTH header, the process does not properly validate the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerabilit

CVSS vector

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages2 packages

CVEListV5d-link/dir-19351.03

Patches

🔴Vulnerability Details

2
GHSA
GHSA-94w7-67qp-92gp: This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DIR-1935 12023-03-29
CVEList
CVE-2022-43622: This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DIR-1935 12023-03-29
CVE-2022-43622 — Stack-based Buffer Overflow in Dlink | cvebase