D-Link Network Assistant Uncontrolled Search Path Element Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of D-Link Network Assistant. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
The specific flaw exists within the DNACore service. The service loads a file from an unsecured location. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-21426.
References
| Link | Resource |
|---|---|
| https://www.zerodayinitiative.com/advisories/ZDI-24-443/ | Third Party Advisory |
| https://www.zerodayinitiative.com/advisories/ZDI-24-443/ | Third Party Advisory |
Configurations
History
04 Sep 2025, 16:32
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:dlink:network_assistant:*:*:*:*:*:*:*:* | |
| References | () https://www.zerodayinitiative.com/advisories/ZDI-24-443/ - Third Party Advisory | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
| First Time |
Dlink
Dlink network Assistant |
Information
Published : 2024-05-23 22:15
Updated : 2025-09-04 16:32
NVD link : CVE-2024-5292
Mitre link : CVE-2024-5292
CVE.ORG link : CVE-2024-5292
JSON object : View
Products Affected
dlink
- network_assistant
CWE
CWE-427
Uncontrolled Search Path Element
