Loading HuntDB...

GHSA-p2jj-p9xc-7g6j

GitHub Security Advisory

⚠ Unreviewed HIGH Has CVE

Advisory Details

This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DAP-2020 1.01rc001 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of the var:menu parameter provided to the webproc endpoint. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-13270.

Related CVEs

Key Information

GHSA ID
GHSA-p2jj-p9xc-7g6j
Published
May 24, 2022 7:18 PM
Last Modified
April 26, 2023 9:30 PM
CVSS Score
7.5 /10
Primary Ecosystem
Unknown
Primary Package
Unknown
GitHub Reviewed
✗ No

Dataset

Last updated: June 18, 2025 6:25 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.