First published: Thu Jan 26 2023(Updated: )
This vulnerability allows network-adjacent attackers to execute arbitrary commands on affected installations of D-Link DIR-2150 4.0.1 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the xupnpd_generic.lua plugin for the xupnpd service, which listens on TCP port 4044 by default. When parsing the feed parameter, the process does not properly validate a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of the service account. Was ZDI-CAN-15906.
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
D-Link DIR-2150 | ||
Dlink Dir-2150 Firmware | <=4.0.1 | |
Dlink Dir-2150 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-40719 is a vulnerability that allows network-adjacent attackers to execute arbitrary commands on D-Link DIR-2150 4.0.1 routers.
CVE-2022-40719 has a severity rating of 8.8 (High).
The affected software for CVE-2022-40719 is D-Link DIR-2150 4.0.1 routers.
No, authentication is not required to exploit CVE-2022-40719.
To fix CVE-2022-40719, install the appropriate patches or firmware updates provided by D-Link.