CVE-2023-45575

9.8 CRITICAL

📋 TL;DR

A critical stack overflow vulnerability in multiple D-Link router models allows remote attackers to execute arbitrary code via the ip parameter in the ip_position.asp function. This affects D-Link DI-7003GV2, DI-7100G+V2, DI-7100GV2, DI-7200G+V2, DI-7200GV2, DI-7300G+V2, and DI-7400G+V2 devices running vulnerable firmware versions. Attackers can gain complete control of affected devices without authentication.

💻 Affected Systems

Products:
  • D-Link DI-7003GV2.D1
  • D-Link DI-7100G+V2.D1
  • D-Link DI-7100GV2.D1
  • D-Link DI-7200G+V2.D1
  • D-Link DI-7200GV2.E1
  • D-Link DI-7300G+V2.D1
  • D-Link DI-7400G+V2.D1
Versions: DI-7003GV2.D1 v23.08.25D1 and before, DI-7100G+V2.D1 v23.08.23D1 and before, DI-7100GV2.D1 v23.08.23D1, DI-7200G+V2.D1 v23.08.23D1 and before, DI-7200GV2.E1 v23.08.23E1 and before, DI-7300G+V2.D1 v23.08.23D1, DI-7400G+V2.D1 v23.08.23D1 and before
Operating Systems: Embedded router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All affected devices with default configurations are vulnerable. The vulnerability is in the web management interface.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device compromise leading to persistent backdoor installation, network traffic interception, lateral movement to internal networks, and botnet recruitment.

🟠

Likely Case

Remote code execution resulting in device takeover, credential theft, and use as pivot point for internal network attacks.

🟢

If Mitigated

Limited impact if devices are behind firewalls with strict inbound filtering and network segmentation.

🌐 Internet-Facing: HIGH - Directly exploitable from internet without authentication on exposed devices.
🏢 Internal Only: HIGH - Exploitable from any network segment with access to device management interface.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public proof-of-concept available in GitHub repository. Exploitation requires sending crafted HTTP request to ip_position.asp endpoint.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Unknown

Restart Required: Yes

Instructions:

1. Check D-Link security advisories for firmware updates. 2. Download latest firmware for your specific model. 3. Backup configuration. 4. Upload firmware via web interface. 5. Reboot device. 6. Restore configuration if needed.

🔧 Temporary Workarounds

Network Access Control

all

Restrict access to device management interface using firewall rules.

Disable Remote Management

all

Turn off WAN-side management access if enabled.

🧯 If You Can't Patch

  • Isolate affected devices in separate VLAN with strict firewall rules
  • Implement network monitoring for exploitation attempts

🔍 How to Verify

Check if Vulnerable:

Check firmware version via web interface: Login > Maintenance > Firmware Upgrade > check current version

Check Version:

curl -k https://[device-ip]/info.html | grep -i firmware

Verify Fix Applied:

Verify firmware version is newer than affected versions listed above

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests to /ip_position.asp with long ip parameters
  • Unusual process execution in device logs
  • Failed authentication attempts followed by successful exploitation

Network Indicators:

  • HTTP POST requests to ip_position.asp endpoint
  • Unusual outbound connections from router
  • Traffic patterns indicating command and control

SIEM Query:

source="router_logs" AND (url="/ip_position.asp" OR url CONTAINS "ip_position") AND (param="ip" AND length(param_value)>100)

🔗 References

📤 Share & Export