First published: Wed Mar 29 2023(Updated: )
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DIR-1935 1.03 routers. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the handling of ConfigFileUpload requests to the web management portal. The issue results from the lack of proper validation of a user-supplied string before using it as a format specifier. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-16141.
Credit: zdi-disclosures@trendmicro.com zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
D-Link DIR-1935 | ||
Dlink Dir-1935 Firmware | <=1.02 | |
Dlink Dir-1935 Firmware | =1.03-b1 | |
Dlink Dir-1935 Firmware | =1.03-b2 | |
Dlink Dir-1935 | ||
D-link Dir-1935 Firmware | <=1.02 | |
D-link Dir-1935 Firmware | =1.03-b1 | |
D-link Dir-1935 Firmware | =1.03-b2 | |
D-Link DIR-1935 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-43619 is a vulnerability that allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DIR-1935 1.03 routers.
CVE-2022-43619 has a severity value of 6.8, which is considered medium.
To exploit CVE-2022-43619, the attacker needs to bypass the existing authentication mechanism and send a specially crafted request to the affected router.
No, CVE-2022-43619 only affects D-Link DIR-1935 firmware versions 1.02, 1.03-b1, and 1.03-b2.
To mitigate CVE-2022-43619, it is recommended to update the affected D-Link DIR-1935 router firmware to a non-vulnerable version as provided by the vendor.