Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-hq6r-hhqx-wvqf

Опубликовано: 18 сент. 2025
Источник: github
Github: Не прошло ревью
CVSS4: 2.1
CVSS3: 6.3

Описание

A weakness has been identified in D-Link DIR-823X 240126/240802/250416. The impacted element is the function sub_412E7C of the file /usr/sbin/goahead of the component Environment Variable Handler. This manipulation of the argument terminal_addr/server_ip/server_port causes command injection. The attack can be initiated remotely. The exploit has been made available to the public and could be exploited.

A weakness has been identified in D-Link DIR-823X 240126/240802/250416. The impacted element is the function sub_412E7C of the file /usr/sbin/goahead of the component Environment Variable Handler. This manipulation of the argument terminal_addr/server_ip/server_port causes command injection. The attack can be initiated remotely. The exploit has been made available to the public and could be exploited.

EPSS

Процентиль: 28%
0.001
Низкий

2.1 Low

CVSS4

6.3 Medium

CVSS3

Дефекты

CWE-74

Связанные уязвимости

CVSS3: 6.3
nvd
5 месяцев назад

A weakness has been identified in D-Link DIR-823X 240126/240802/250416. The impacted element is the function sub_412E7C of the file /usr/sbin/goahead of the component Environment Variable Handler. This manipulation of the argument terminal_addr/server_ip/server_port causes command injection. The attack can be initiated remotely. The exploit has been made available to the public and could be exploited.

CVSS3: 8.8
fstec
5 месяцев назад

Уязвимость функции sub_412E7C() файла /usr/sbin/goahead микропрограммного обеспечения маршрутизаторов D-Link DIR-823X , позволяющая нарушителю выполнить произвольные команды

EPSS

Процентиль: 28%
0.001
Низкий

2.1 Low

CVSS4

6.3 Medium

CVSS3

Дефекты

CWE-74