Vulnerability Description
A command injection in the parsing_xml_stasurvey function inside libcgifunc.so of the D-Link DAP-X1860 repeater 1.00 through 1.01b05-01 allows attackers (within range of the repeater) to run shell commands as root during the setup process of the repeater, via a crafted SSID. Also, network names containing single quotes (in the range of the repeater) can result in a denial of service.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Dlink | Dap-1860 Firmware | 1.00 |
| Dlink | Dap-1860 | - |
Related Weaknesses (CWE)
References
- https://www.redteam-pentesting.de/en/advisories/rt-sa-2023-006/-d-link-dap-x1860ExploitProductThird Party Advisory
- https://www.redteam-pentesting.de/en/advisories/rt-sa-2023-006/-d-link-dap-x1860ExploitProductThird Party Advisory
FAQ
What is CVE-2023-45208?
CVE-2023-45208 is a vulnerability with a CVSS score of 8.8 (HIGH). A command injection in the parsing_xml_stasurvey function inside libcgifunc.so of the D-Link DAP-X1860 repeater 1.00 through 1.01b05-01 allows attackers (within range of the repeater) to run shell com...
How severe is CVE-2023-45208?
CVE-2023-45208 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-45208?
Check the references section above for vendor advisories and patch information. Affected products include: Dlink Dap-1860 Firmware, Dlink Dap-1860.