CVE-2023-44403

D-Link DAP-1325 HNAP SetWLanRadioSettings Channel Command Injection Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DAP-1325 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of a request parameter provided to the HNAP1 SOAP endpoint. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-18822.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:dlink:dap-1325_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:dlink:dap-1325:a1:*:*:*:*:*:*:*

History

12 Mar 2025, 17:40

Type Values Removed Values Added
References () https://www.zerodayinitiative.com/advisories/ZDI-23-1501/ - () https://www.zerodayinitiative.com/advisories/ZDI-23-1501/ - Third Party Advisory
First Time Dlink dap-1325 Firmware
Dlink
Dlink dap-1325
CPE cpe:2.3:h:dlink:dap-1325:a1:*:*:*:*:*:*:*
cpe:2.3:o:dlink:dap-1325_firmware:*:*:*:*:*:*:*:*

Information

Published : 2024-05-03 03:15

Updated : 2025-03-12 17:40


NVD link : CVE-2023-44403

Mitre link : CVE-2023-44403

CVE.ORG link : CVE-2023-44403


JSON object : View

Products Affected

dlink

  • dap-1325_firmware
  • dap-1325
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')