CVE-2023-45580

9.8 CRITICAL

📋 TL;DR

A buffer overflow vulnerability in multiple D-Link router models allows remote attackers to execute arbitrary code via specific parameters in the ddns.asp function. This affects D-Link DI-7003GV2, DI-7100G+V2, DI-7100GV2, DI-7200G+V2, DI-7200GV2, DI-7300G+V2, and DI-7400G+V2 devices running vulnerable firmware versions. Attackers can exploit this without authentication to gain full control of affected devices.

💻 Affected Systems

Products:
  • D-Link DI-7003GV2.D1
  • D-Link DI-7100G+V2.D1
  • D-Link DI-7100GV2.D1
  • D-Link DI-7200G+V2.D1
  • D-Link DI-7200GV2.E1
  • D-Link DI-7300G+V2.D1
  • D-Link DI-7400G+V2.D1
Versions: DI-7003GV2.D1 v23.08.25D1 and before, DI-7100G+V2.D1 v23.08.23D1 and before, DI-7100GV2.D1 v23.08.23D1, DI-7200G+V2.D1 v23.08.23D1 and before, DI-7200GV2.E1 v23.08.23E1 and before, DI-7300G+V2.D1 v23.08.23D1, DI-7400G+V2.D1 v23.08.23D1 and before
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the Dynamic DNS (DDNS) configuration page functionality. No special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device compromise leading to persistent backdoor installation, network traffic interception, lateral movement to internal networks, and botnet recruitment.

🟠

Likely Case

Remote code execution allowing attackers to modify device configuration, steal credentials, or use device as pivot point for further attacks.

🟢

If Mitigated

Limited impact if devices are behind firewalls with strict inbound filtering and network segmentation.

🌐 Internet-Facing: HIGH - These are network perimeter devices often directly exposed to the internet for management.
🏢 Internal Only: MEDIUM - Still vulnerable to internal threats but attack surface is reduced.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Proof-of-concept available in GitHub repository. Exploitation requires sending crafted HTTP requests to the ddns.asp endpoint with malicious parameters.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: Yes

Instructions:

1. Check D-Link support site for firmware updates. 2. Download appropriate firmware for your model. 3. Access router web interface. 4. Navigate to System Tools > Firmware Upgrade. 5. Upload firmware file. 6. Wait for reboot.

🔧 Temporary Workarounds

Disable WAN Management Access

all

Prevent external access to router management interface

Access router web interface > Security > Remote Management > Disable

Block Access to ddns.asp

linux

Use firewall rules to block access to vulnerable endpoint

iptables -A INPUT -p tcp --dport 80 -m string --string "ddns.asp" --algo bm -j DROP
iptables -A INPUT -p tcp --dport 443 -m string --string "ddns.asp" --algo bm -j DROP

🧯 If You Can't Patch

  • Isolate affected devices in separate VLAN with strict access controls
  • Implement network monitoring for suspicious HTTP requests to ddns.asp endpoint

🔍 How to Verify

Check if Vulnerable:

Check firmware version in router web interface under System Tools > Firmware Information

Check Version:

curl -s http://router-ip/ | grep -i firmware || ssh admin@router-ip 'show version'

Verify Fix Applied:

Verify firmware version is newer than affected versions listed above

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests to /ddns.asp with unusual parameter values
  • Multiple failed login attempts followed by successful access

Network Indicators:

  • Unusual outbound connections from router
  • HTTP POST requests to ddns.asp with long parameter strings

SIEM Query:

source="router_logs" AND (uri="*ddns.asp*" AND (param="*wild*" OR param="*mx*"))

🔗 References

📤 Share & Export