First published: Thu Nov 17 2022(Updated: )
DLINK - DSL-224 Post-auth PCE. DLINK router has an interface where you can configure NTP servers (Network Time Protocol) via jsonrpc API. It is possible to inject a command through this interface that will run with ROOT permissions on the router.
Credit: cna@cyber.gov.il
Affected Software | Affected Version | How to fix |
---|---|---|
D-Link DSL-224 | ||
D-Link DSL-224 | ||
All of | ||
D-Link DSL-224 | ||
D-Link DSL-224 |
Update to version 3.0.9_Beta Hotfix
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-36786 has a high severity rating due to its potential for remote code execution with ROOT permissions.
To fix CVE-2022-36786, ensure your D-Link DSL-224 firmware is updated to the latest patched version provided by the manufacturer.
CVE-2022-36786 allows for post-authentication remote code execution through the router's NTP server configuration interface.
Users of the D-Link DSL-224 router are affected by CVE-2022-36786 if they are running vulnerable versions of the firmware.
Yes, CVE-2022-36786 exploits the JSON-RPC API for configuration, so if your router uses this interface, it remains vulnerable regardless of your API usage.