Updated on 6 February 2024
TBC
An unauthenticated attacker can gain Remote Code Execution in the D-Link DIR-822 router due to a stack-based buffer overflow vulnerability in the HNAP service.
TBC
CWE-787: Out-of-bounds Write
CWE-121: Stack-based Buffer Overflow
A stack-based buffer overflow vulnerability is discovered in the (Home Network Administration Protocol) service on the D-Link DIR-822 routers. This vulnerability can be exploited by unauthenticated attackers to gain arbitrary remote code execution on the vulnerable router.
The latest firmware version (v2.03B01) released for DIR-822-CA (Rev.B) on 27 October 2023 is still vulnerable to exploitation. Firmware development for DIR-822 (Rev. A and Rev.B models) has ceased and these devices will no longer be supported. D-Link US recommends D-Link devices that have reached EOL/EOS, to be retired and replaced.
10 January 2024 – Initial contact with D-Link
16 January 2024 – Vulnerability Disclosure
31 January 2024 – Public Support Announcement by D-Link for DIR-822
Ensign InfoSecurity Labs – Quynh Le, Eng De Sheng