First published: Thu Jul 15 2021(Updated: )
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DAP-1330 1.13B01 BETA routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of the HNAP_AUTH HTTP header. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length buffer. An attacker can leverage this vulnerability to execute code in the context of the device. Was ZDI-CAN-12065.
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
D-Link DAP-1330 | ||
Dlink Dap-1330 Firmware | =1.13b01-beta | |
Dlink Dap-1330 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-34829 is a vulnerability that allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DAP-1330 1.13B01 BETA routers.
CVE-2021-34829 has a severity rating of 8.8 (high).
The affected software of CVE-2021-34829 is D-Link DAP-1330 1.13B01 BETA routers.
No, authentication is not required to exploit CVE-2021-34829.
To fix CVE-2021-34829, it is recommended to apply the latest firmware update provided by D-Link.