This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DIR-825/EE routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the Dreambox plugin for the xupnpd service, which listens on TCP port 4044. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of the admin user.
Affected Software | Affected Version | How to fix |
---|---|---|
D-Link DIR-825/AC |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-22-1703 is high due to the potential for remote code execution by unauthenticated attackers.
To fix ZDI-22-1703, update the D-Link DIR-825 router to the latest firmware version that addresses this vulnerability.
ZDI-22-1703 affects users of the D-Link DIR-825/EE routers running vulnerable versions of the Dreambox plugin for the xupnpd service.
Yes, ZDI-22-1703 can be exploited remotely by network-adjacent attackers without requiring authentication.
ZDI-22-1703 is a remote code execution vulnerability that occurs within the Dreambox plugin used by the xupnpd service.