CVE-2024-48168

Improper Control of Generation of Code ('Code Injection') (CWE-94)

Published: Oct 14, 2024 / Updated: 36d ago

010
CVSS 9.8EPSS 0.04%Critical
CVE info copied to clipboard

Summary

A stack overflow vulnerability exists in the sub_402280 function of the HNAP service of D-Link DCS-960L 1.09, allowing an attacker to execute arbitrary code.

Impact

This vulnerability allows an attacker to execute arbitrary code on the affected D-Link DCS-960L devices. The attack can be performed remotely over the network without requiring any user interaction or privileges. The impact is severe, affecting the confidentiality, integrity, and availability of the system, all rated as HIGH. This could lead to complete compromise of the device, potentially allowing an attacker to gain full control, steal sensitive information, modify system settings, or render the device inoperable.

Exploitation

There is no evidence that a public proof-of-concept exists. There is no evidence of proof of exploitation at the moment.

Patch

As of the provided information, there is no mention of an available patch for this vulnerability.

Mitigation

Given the severity of the vulnerability and the lack of a mentioned patch, the following mitigation steps are recommended: 1. Immediately isolate affected D-Link DCS-960L devices from the network, especially from internet exposure. 2. If possible, disable the HNAP service on these devices. 3. Implement strong network segmentation to limit potential attacker access to these devices. 4. Monitor for any suspicious activities or unauthorized access attempts to these devices. 5. Contact D-Link support for any available security updates or firmware patches. 6. Consider replacing the affected devices with newer, more secure models if patches are not available. 7. Regularly check for and apply any future security updates from D-Link.

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Timeline

CVE Assignment

NVD published the first details for CVE-2024-48168

Oct 14, 2024 at 5:15 PM
First Article

Feedly found the first article mentioning CVE-2024-48168. See article

Oct 14, 2024 at 5:23 PM / Vulners.com RSS Feed
CVSS Estimate

Feedly estimated the CVSS score as HIGH

Oct 14, 2024 at 5:23 PM
EPSS

EPSS Score was set to: 0.04% (Percentile: 9.7%)

Oct 15, 2024 at 10:16 AM
CVSS

A CVSS base score of 9.8 has been assigned.

Oct 15, 2024 at 4:41 PM / nvd
Static CVE Timeline Graph

Affected Systems

D-link/dcs-960l
+null more

Attack Patterns

CAPEC-242: Code Injection
+null more

News

CVE-2024-48168
Critical Severity Description A stack overflow vulnerability exists in the sub_402280 function of the HNAP service of D-Link DCS-960L 1.09, allowing an attacker to execute arbitrary code. Read more at https://www.tenable.com/cve/CVE-2024-48168
NA - CVE-2024-48168 - A stack overflow vulnerability exists in the...
A stack overflow vulnerability exists in the sub_402280 function of the HNAP service of D-Link DCS-960L 1.09, allowing an attacker to execute arbitrary code.
CVE-2024-48168 | D-Link DCS-960L 1.09 HNAP Service sub_402280 stack-based overflow
A vulnerability has been found in D-Link DCS-960L 1.09 and classified as critical . This vulnerability affects the function sub_402280 of the component HNAP Service . The manipulation leads to stack-based buffer overflow. This vulnerability was named CVE-2024-48168 . The attack can be initiated remotely. There is no exploit available.
We have just added an important vulnerability affecting D-Link DCS-960L (CVE-2024-48168) https:// vuldb.com/?id.280300
CVE-2024-48168 - D-Link DCS-960L HNAP Stack Overflow Buffer Overflow Vulnerability
CVE ID : CVE-2024-48168 Published : Oct. 14, 2024, 5:15 p.m. 21 minutes ago Description : A stack overflow vulnerability exists in the sub_402280 function of the HNAP service of D-Link DCS-960L 1.09, allowing an attacker to execute arbitrary code. Severity: 0.0 NA Visit the link for more details, such as CVSS details, affected products, timeline, and more...
See 4 more articles and social media posts

CVSS V3.1

Attack Vector:Network
Attack Complexity:Low
Privileges Required:None
User Interaction:None
Scope:Unchanged
Confidentiality:High
Integrity:High
Availability Impact:High

Categories

Be the first to know about critical vulnerabilities

Collect, analyze, and share vulnerability reports faster using AI