CVE-2024-5292

D-Link Network Assistant Uncontrolled Search Path Element Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of D-Link Network Assistant. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the DNACore service. The service loads a file from an unsecured location. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-21426.
Configurations

Configuration 1 (hide)

cpe:2.3:a:dlink:network_assistant:*:*:*:*:*:*:*:*

History

04 Sep 2025, 16:32

Type Values Removed Values Added
First Time Dlink network Assistant
Dlink
CVSS v2 : unknown
v3 : 7.3
v2 : unknown
v3 : 7.8
References () https://www.zerodayinitiative.com/advisories/ZDI-24-443/ - () https://www.zerodayinitiative.com/advisories/ZDI-24-443/ - Third Party Advisory
CPE cpe:2.3:a:dlink:network_assistant:*:*:*:*:*:*:*:*

21 Nov 2024, 09:47

Type Values Removed Values Added
References () https://www.zerodayinitiative.com/advisories/ZDI-24-443/ - () https://www.zerodayinitiative.com/advisories/ZDI-24-443/ -

24 May 2024, 01:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-23 22:15

Updated : 2025-09-04 16:32


NVD link : CVE-2024-5292

Mitre link : CVE-2024-5292

CVE.ORG link : CVE-2024-5292


JSON object : View

Products Affected

dlink

  • network_assistant
CWE
CWE-427

Uncontrolled Search Path Element