HTTP: D-Link DIR-2640 HNAP PrefixLen Command Injection

This signature detects attempts to exploit a known vulnerability against D-Link DIR-2640 HNAP. A successful attack can lead to command injection and arbitrary code execution.

Extended Description

D-Link DIR-2640 PrefixLen Command Injection Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DIR-2640 routers. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the handling of the PrefixLen parameter provided to the HNAP1 endpoint. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. . Was ZDI-CAN-19547.

Short Name
HTTP:CTS:D-LINK-HNAP-CMD-INJ
Severity
Major
Recommended
True
Recommended Action
Drop
Category
HTTP
Keywords
CVE-2023-32150 CVE-2023-32153 Command D-Link DIR-2640 HNAP Injection PrefixLen
Release Date
09/08/2023
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3742
False Positive
Unknown

Found a potential security threat?