This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DIR-1935 routers. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the handling of ConfigFileUpload requests to the web management portal. The issue results from the lack of proper validation of a user-supplied string before using it as a format specifier. An attacker can leverage this vulnerability to execute code in the context of root.
Affected Software | Affected Version | How to fix |
---|---|---|
D-Link DIR-1935 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-22-1493 is critical due to the potential for remote code execution by network-adjacent attackers.
To fix ZDI-22-1493, it is recommended to update the D-Link DIR-1935 router firmware to the latest version provided by D-Link.
ZDI-22-1493 can facilitate arbitrary code execution attacks on affected D-Link DIR-1935 routers.
Users of D-Link DIR-1935 routers are affected by ZDI-22-1493 due to a vulnerability that allows exploitation with bypassed authentication.
Yes, authentication is necessary to exploit ZDI-22-1493, but it can be bypassed by attackers.