Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-w6mr-25xf-vppm

Опубликовано: 05 мая 2022
Источник: github
Github: Не прошло ревью

Описание

An issue was discovered in soap.cgi?service=WANIPConn1 on D-Link DIR-845 before v1.02b03, DIR-600 before v2.17b01, DIR-645 before v1.04b11, DIR-300 rev. B, and DIR-865 devices. There is Command Injection via shell metacharacters in the NewInternalClient, NewExternalPort, or NewInternalPort element of a SOAP POST request.

An issue was discovered in soap.cgi?service=WANIPConn1 on D-Link DIR-845 before v1.02b03, DIR-600 before v2.17b01, DIR-645 before v1.04b11, DIR-300 rev. B, and DIR-865 devices. There is Command Injection via shell metacharacters in the NewInternalClient, NewExternalPort, or NewInternalPort element of a SOAP POST request.

EPSS

Процентиль: 96%
0.29652
Средний

Дефекты

CWE-77

Связанные уязвимости

CVSS3: 9.8
nvd
больше 6 лет назад

An issue was discovered in soap.cgi?service=WANIPConn1 on D-Link DIR-845 before v1.02b03, DIR-600 before v2.17b01, DIR-645 before v1.04b11, DIR-300 rev. B, and DIR-865 devices. There is Command Injection via shell metacharacters in the NewInternalClient, NewExternalPort, or NewInternalPort element of a SOAP POST request.

EPSS

Процентиль: 96%
0.29652
Средний

Дефекты

CWE-77