CVE-2024-23625: D-Link DAP-1650 SUBSCRIBE Callback Command Injection Vulnerability

9.6 CVSS

Description

A command injection vulnerability exists in D-Link DAP-1650 devices when handling UPnP SUBSCRIBE messages. An unauthenticated attacker can exploit this vulnerability to gain command execution on the device as root.

Classification

CVE ID: CVE-2024-23625

CVSS Base Severity: CRITICAL

CVSS Base Score: 9.6

CVSS Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

Problem Types

CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection')

Affected Products

Vendor: D-Link

Product: DAP-1650

Exploit Prediction Scoring System (EPSS)

EPSS Score: 7.63% (probability of being exploited)

EPSS Percentile: 91.38% (scored less or equal to compared to others)

EPSS Date: 2025-06-06 (when was this score calculated)

Stakeholder-Specific Vulnerability Categorization (SSVC)

SSVC Exploitation: none

SSVC Technical Impact: total

SSVC Automatable: false

References

https://nvd.nist.gov/vuln/detail/CVE-2024-23625
https://blog.exodusintel.com/2024/01/25/d-link-dap-1650-subscribe-callback-command-injection-vulnerability/

Timeline