Логотип exploitDog
bind:CVE-2019-7297
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2019-7297

Количество 3

Количество 3

nvd логотип

CVE-2019-7297

около 7 лет назад

An issue was discovered on D-Link DIR-823G devices with firmware through 1.02B03. A command Injection vulnerability allows attackers to execute arbitrary OS commands via shell metacharacters in a crafted /HNAP1 request. This occurs when the GetNetworkTomographyResult function calls the system function with an untrusted input parameter named Address. Consequently, an attacker can execute any command remotely when they control this input.

CVSS3: 9.8
EPSS: Средний
github логотип

GHSA-8jwc-8ww6-25xw

больше 3 лет назад

An issue was discovered on D-Link DIR-823G devices with firmware through 1.02B03. A command Injection vulnerability allows attackers to execute arbitrary OS commands via shell metacharacters in a crafted /HNAP1 request. This occurs when the GetNetworkTomographyResult function calls the system function with an untrusted input parameter named Address. Consequently, an attacker can execute any command remotely when they control this input.

CVSS3: 9.8
EPSS: Средний
fstec логотип

BDU:2019-00683

около 7 лет назад

Уязвимость функции GetNetworkTomographyResult микропрограммного обеспечения маршрутизатора D–Link DIR-823G, позволяющая нарушителю выполнить произвольные команды операционной системы

CVSS3: 5.5
EPSS: Средний

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2019-7297

An issue was discovered on D-Link DIR-823G devices with firmware through 1.02B03. A command Injection vulnerability allows attackers to execute arbitrary OS commands via shell metacharacters in a crafted /HNAP1 request. This occurs when the GetNetworkTomographyResult function calls the system function with an untrusted input parameter named Address. Consequently, an attacker can execute any command remotely when they control this input.

CVSS3: 9.8
21%
Средний
около 7 лет назад
github логотип
GHSA-8jwc-8ww6-25xw

An issue was discovered on D-Link DIR-823G devices with firmware through 1.02B03. A command Injection vulnerability allows attackers to execute arbitrary OS commands via shell metacharacters in a crafted /HNAP1 request. This occurs when the GetNetworkTomographyResult function calls the system function with an untrusted input parameter named Address. Consequently, an attacker can execute any command remotely when they control this input.

CVSS3: 9.8
21%
Средний
больше 3 лет назад
fstec логотип
BDU:2019-00683

Уязвимость функции GetNetworkTomographyResult микропрограммного обеспечения маршрутизатора D–Link DIR-823G, позволяющая нарушителю выполнить произвольные команды операционной системы

CVSS3: 5.5
21%
Средний
около 7 лет назад

Уязвимостей на страницу