Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-9459-cp56-77p3

Опубликовано: 13 нояб. 2025
Источник: github
Github: Не прошло ревью
CVSS3: 6.5

Описание

A command injection vulnerability exists in the D-Link DIR-823G router firmware DIR823G_V1.0.2B05_20181207.bin in the timelycheck and sysconf binaries, which process the /tmp/new_qos.rule configuration file. The vulnerability occurs because parsed fields from the configuration file are concatenated into command strings and executed via system() without any sanitization. An attacker with write access to /tmp/new_qos.rule can execute arbitrary commands on the device.

A command injection vulnerability exists in the D-Link DIR-823G router firmware DIR823G_V1.0.2B05_20181207.bin in the timelycheck and sysconf binaries, which process the /tmp/new_qos.rule configuration file. The vulnerability occurs because parsed fields from the configuration file are concatenated into command strings and executed via system() without any sanitization. An attacker with write access to /tmp/new_qos.rule can execute arbitrary commands on the device.

EPSS

Процентиль: 78%
0.01181
Низкий

6.5 Medium

CVSS3

Дефекты

CWE-77

Связанные уязвимости

CVSS3: 5.4
nvd
около 1 месяца назад

A command injection vulnerability exists in the D-Link DIR-823G router firmware DIR823G_V1.0.2B05_20181207.bin in the timelycheck and sysconf binaries, which process the /tmp/new_qos.rule configuration file. The vulnerability occurs because parsed fields from the configuration file are concatenated into command strings and executed via system() without any sanitization. An attacker with write access to /tmp/new_qos.rule can execute arbitrary commands on the device.

CVSS3: 5.4
fstec
около 1 месяца назад

Уязвимость файла /tmp/new_qos.rule микропрограммного обеспечения маршрутизаторов D-link DIR-823G, позволяющая нарушителю выполнить произвольные команды

EPSS

Процентиль: 78%
0.01181
Низкий

6.5 Medium

CVSS3

Дефекты

CWE-77