D-Link Network Assistant Uncontrolled Search Path Element Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of D-Link Network Assistant. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
The specific flaw exists within the DNACore service. The service loads a file from an unsecured location. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-21426.
References
Link | Resource |
---|---|
https://www.zerodayinitiative.com/advisories/ZDI-24-443/ | Third Party Advisory |
https://www.zerodayinitiative.com/advisories/ZDI-24-443/ | Third Party Advisory |
Configurations
History
04 Sep 2025, 16:32
Type | Values Removed | Values Added |
---|---|---|
First Time |
Dlink network Assistant
Dlink |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
References | () https://www.zerodayinitiative.com/advisories/ZDI-24-443/ - Third Party Advisory | |
CPE | cpe:2.3:a:dlink:network_assistant:*:*:*:*:*:*:*:* |
21 Nov 2024, 09:47
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.zerodayinitiative.com/advisories/ZDI-24-443/ - |
24 May 2024, 01:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-05-23 22:15
Updated : 2025-09-04 16:32
NVD link : CVE-2024-5292
Mitre link : CVE-2024-5292
CVE.ORG link : CVE-2024-5292
JSON object : View
Products Affected
dlink
- network_assistant
CWE
CWE-427
Uncontrolled Search Path Element