
Cloud Vulnerability DB
A community-led vulnerabilities database
A network-adjacent vulnerability was discovered in D-Link DAP-2622 routers, identified as CVE-2023-44417. The flaw exists within the DDP service and was reported to D-Link on January 20, 2023. The vulnerability received a high CVSS score of 8.8 and affects the DAP-2622 router model (Zero Day Initiative).
The vulnerability stems from improper validation of user-supplied data length before copying it to a fixed-length stack-based buffer in the DDP service. This stack-based buffer overflow vulnerability can be exploited without requiring authentication. The severity is reflected in its CVSS score of 8.8 (AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) (Zero Day Initiative).
Successful exploitation of this vulnerability allows attackers to execute arbitrary code in the context of root on affected D-Link DAP-2622 routers. The high CVSS score indicates severe potential impacts on system confidentiality, integrity, and availability (Zero Day Initiative).
The primary mitigation strategy is to restrict interaction with the application. Despite vendor notification in January 2023 and a subsequent update release in August 2023, this specific vulnerability was not addressed in the update. The vendor was informed of this oversight on August 31, 2023 (Zero Day Initiative).
The vulnerability was initially reported through the Zero Day Initiative program and was eventually published as a zero-day advisory on October 4, 2023, after multiple attempts to coordinate with the vendor for a proper fix (Zero Day Initiative).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."