A command injection in the parsing_xml_stasurvey function inside libcgifunc.so of the D-Link DAP-X1860 repeater 1.00 through 1.01b05-01 allows attackers (within range of the repeater) to run shell commands as root during the setup process of the repeater, via a crafted SSID. Also, network names containing single quotes (in the range of the repeater) can result in a denial of service.
References
Link | Resource |
---|---|
https://www.redteam-pentesting.de/en/advisories/rt-sa-2023-006/-d-link-dap-x1860-remote-command-injection | Exploit Product Third Party Advisory |
https://www.redteam-pentesting.de/en/advisories/rt-sa-2023-006/-d-link-dap-x1860-remote-command-injection | Exploit Product Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 08:26
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-10-10 05:15
Updated : 2024-11-21 08:26
NVD link : CVE-2023-45208
Mitre link : CVE-2023-45208
CVE.ORG link : CVE-2023-45208
JSON object : View
Products Affected
dlink
- dap-1860
- dap-1860_firmware
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')