Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-rm3g-gj58-gg6q

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

D-Link DIR-859 1.05 and 1.06B01 Beta01 devices allow remote attackers to execute arbitrary OS commands via the urn: to the M-SEARCH method in ssdpcgi() in /htdocs/cgibin, because SERVER_ID is mishandled. The value of the urn: service/device is checked with the strstr function, which allows an attacker to concatenate arbitrary commands separated by shell metacharacters.

D-Link DIR-859 1.05 and 1.06B01 Beta01 devices allow remote attackers to execute arbitrary OS commands via the urn: to the M-SEARCH method in ssdpcgi() in /htdocs/cgibin, because SERVER_ID is mishandled. The value of the urn: service/device is checked with the strstr function, which allows an attacker to concatenate arbitrary commands separated by shell metacharacters.

EPSS

Процентиль: 90%
0.05786
Низкий

Связанные уязвимости

CVSS3: 9.8
nvd
около 6 лет назад

D-Link DIR-859 1.05 and 1.06B01 Beta01 devices allow remote attackers to execute arbitrary OS commands via the urn: to the M-SEARCH method in ssdpcgi() in /htdocs/cgibin, because SERVER_ID is mishandled. The value of the urn: service/device is checked with the strstr function, which allows an attacker to concatenate arbitrary commands separated by shell metacharacters.

CVSS3: 9.8
fstec
около 6 лет назад

Уязвимость компонента SERVER_ID микропрограммного обеспечения маршрутизатора D-Link DIR-859, существующая из-за непринятия мер по нейтрализации специальных элементов, используемых в команде операционной системы, позволяющая нарушителю выполнить произвольные команды

EPSS

Процентиль: 90%
0.05786
Низкий