Описание
An issue was discovered in D-Link DIR816_A1_FW101CNB04 750m11ac wireless router, The HTTP request parameter is used in the handler function of /goform/form2userconfig.cgi route, which can construct the user name string to delete the user function. This can lead to command injection through shell metacharacters.
Ссылки
- Third Party Advisory
- ExploitThird Party Advisory
- Vendor Advisory
- Third Party Advisory
- ExploitThird Party Advisory
- Vendor Advisory
Уязвимые конфигурации
Конфигурация 1
Одновременно
cpe:2.3:o:dlink:dir-816_firmware:101cnb04:*:*:*:*:*:*:*
cpe:2.3:h:dlink:dir-816:a1:*:*:*:*:*:*:*
EPSS
Процентиль: 91%
0.06502
Низкий
9.8 Critical
CVSS3
7.5 High
CVSS2
Дефекты
CWE-77
Связанные уязвимости
github
больше 3 лет назад
An issue was discovered in D-Link DIR816_A1_FW101CNB04 750m11ac wireless router via the HTTP request parameter in the handler function of /goform/form2userconfig.cgi route, which can construct the user name string to delete the user function.
EPSS
Процентиль: 91%
0.06502
Низкий
9.8 Critical
CVSS3
7.5 High
CVSS2
Дефекты
CWE-77