CVE-2023-44416OS Command Injection in D-link Dap-2622

Severity
6.8MEDIUMNVD
EPSS
1.1%
top 21.86%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMay 3

Description

D-Link DAP-2622 Telnet CLI Command Injection Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DAP-2622. Authentication is required to exploit this vulnerability. The specific flaw exists within the CLI service, which listens on TCP port 23. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vuln

CVSS vector

CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:HExploitability: 0.9 | Impact: 5.9

Affected Packages2 packages

CVEListV5d-link/dap-26221.00 dated 16-12-2020

🔴Vulnerability Details

2
CVEList
D-Link DAP-2622 Telnet CLI Command Injection Remote Code Execution Vulnerability2024-05-03
GHSA
GHSA-jwgc-2cm6-rgjp: D-Link DAP-2622 Telnet CLI Command Injection Remote Code Execution Vulnerability2024-05-03
CVE-2023-44416 — OS Command Injection in D-link | cvebase