Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-jrmw-6fvh-x39j

Опубликовано: 08 фев. 2026
Источник: github
Github: Не прошло ревью
CVSS4: 7.3
CVSS3: 7.2

Описание

A vulnerability was identified in D-Link DIR-823X 250416. This affects an unknown function of the file /goform/set_server_settings of the component Configuration Parameter Handler. The manipulation of the argument terminal_addr/server_ip/server_port leads to os command injection. The attack may be initiated remotely. The exploit is publicly available and might be used.

A vulnerability was identified in D-Link DIR-823X 250416. This affects an unknown function of the file /goform/set_server_settings of the component Configuration Parameter Handler. The manipulation of the argument terminal_addr/server_ip/server_port leads to os command injection. The attack may be initiated remotely. The exploit is publicly available and might be used.

EPSS

Процентиль: 41%
0.00189
Низкий

7.3 High

CVSS4

7.2 High

CVSS3

Дефекты

CWE-77

Связанные уязвимости

CVSS3: 7.2
nvd
2 дня назад

A vulnerability was identified in D-Link DIR-823X 250416. This affects an unknown function of the file /goform/set_server_settings of the component Configuration Parameter Handler. The manipulation of the argument terminal_addr/server_ip/server_port leads to os command injection. The attack may be initiated remotely. The exploit is publicly available and might be used.

EPSS

Процентиль: 41%
0.00189
Низкий

7.3 High

CVSS4

7.2 High

CVSS3

Дефекты

CWE-77