First published: Tue Oct 10 2023(Updated: )
A command injection in the parsing_xml_stasurvey function inside libcgifunc.so of the D-Link DAP-X1860 repeater 1.00 through 1.01b05-01 allows attackers (within range of the repeater) to run shell commands as root during the setup process of the repeater, via a crafted SSID. Also, network names containing single quotes (in the range of the repeater) can result in a denial of service.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Dlink Dap-1860 Firmware | =1.00 | |
Dlink Dap-1860 Firmware | =1.01b05-01 | |
Dlink Dap-1860 Firmware | =1.01b94 | |
Dlink Dap-1860 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-45208 is high.
The command injection vulnerability in CVE-2023-45208 allows attackers within range of the repeater to run shell commands as root during the setup process of the repeater by sending a crafted SSID.
The D-Link DAP-X1860 repeater firmware versions 1.00 and 1.01b05-01 are affected by CVE-2023-45208.
To fix CVE-2023-45208, update the firmware of your D-Link DAP-X1860 repeater to a version that is not vulnerable.
You can find more information about CVE-2023-45208 at the following reference: https://www.redteam-pentesting.de/en/advisories/rt-sa-2023-006/-d-link-dap-x1860-remote-command-injection