Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-5292— D-Link Network Assistant Uncontrolled Search Path Element Local Privilege Escalation Vulnerability

EPSS 0.12% · P31
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2024-5292

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
D-Link Network Assistant Uncontrolled Search Path Element Local Privilege Escalation Vulnerability
Source: NVD (National Vulnerability Database)
Vulnerability Description
D-Link Network Assistant Uncontrolled Search Path Element Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of D-Link Network Assistant. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the DNACore service. The service loads a file from an unsecured location. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-21426.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
对搜索路径元素未加控制
Source: NVD (National Vulnerability Database)
Vulnerability Title
D-Link Network Assistant 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
D-Link Network Assistant是中国友讯(D-Link)公司的一个网络助手。 D-Link Network Assistant 4.0.0.21及之前版本存在安全漏洞,该漏洞源于存在本地权限升级漏洞,从而导致攻击者可以提升权限并在SYSTEM环境中执行任意代码。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
D-LinkNetwork Assistant 4.0.0.21 -

II. Public POCs for CVE-2024-5292

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2024-5292

登录查看更多情报信息。

Same Patch Batch · D-Link · 2024-05-23 · 9 CVEs total

CVE-2024-5291D-Link DIR-2150 GetDeviceSettings Target Command Injection Remote Code Execution Vulnerabi
CVE-2024-5293D-Link DIR-2640 HTTP Referer Stack-Based Buffer Overflow Remote Code Execution Vulnerabili
CVE-2024-5294D-Link DIR-3040 prog.cgi websSecurityHandler Memory Leak Denial-of-Service Vulnerability
CVE-2024-5295D-Link G416 flupl self Command Injection Remote Code Execution Vulnerability
CVE-2024-5296D-Link D-View Use of Hard-coded Cryptographic Key Authentication Bypass Vulnerability
CVE-2024-5297D-Link D-View executeWmicCmd Command Injection Remote Code Execution Vulnerability
CVE-2024-5298D-Link D-View queryDeviceCustomMonitorResult Exposed Dangerous Method Remote Code Executio
CVE-2024-5299D-Link D-View execMonitorScript Exposed Dangerous Method Remote Code Execution Vulnerabili

IV. Related Vulnerabilities

V. Comments for CVE-2024-5292

No comments yet


Leave a comment