CVE-2023-32143

CWE-1973 documents3 sources
Severity
8.8HIGH
EPSS
0.5%
top 32.84%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMay 3

Description

D-Link DAP-1360 webupg UPGCGI_CheckAuth Numeric Truncation Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DAP-1360 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of requests to the /cgi-bin/webupg endpoint. The issue results from the lack of proper validation of user-supplied data, which can result in an integer overflow be

CVSS vector

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages3 packages

NVDdlink/dap-1360_firmware< 6.15eub01
CVEListV5d-link/dap-13606.14B01 EU HOTFIX
NVDdlink/dap-2020_firmware< 1.03rc004

Patches

🔴Vulnerability Details

2
CVEList
D-Link DAP-1360 webupg UPGCGI_CheckAuth Numeric Truncation Remote Code Execution Vulnerability2024-05-03
GHSA
GHSA-7g6f-r888-776w: D-Link DAP-1360 webupg UPGCGI_CheckAuth Numeric Truncation Remote Code Execution Vulnerability2024-05-03
CVE-2023-32143 (HIGH CVSS 8.8) | D-Link DAP-1360 webupg UPGCGI_Check | cvebase.io