Количество 3
Количество 3
CVE-2019-7297
An issue was discovered on D-Link DIR-823G devices with firmware through 1.02B03. A command Injection vulnerability allows attackers to execute arbitrary OS commands via shell metacharacters in a crafted /HNAP1 request. This occurs when the GetNetworkTomographyResult function calls the system function with an untrusted input parameter named Address. Consequently, an attacker can execute any command remotely when they control this input.
GHSA-8jwc-8ww6-25xw
An issue was discovered on D-Link DIR-823G devices with firmware through 1.02B03. A command Injection vulnerability allows attackers to execute arbitrary OS commands via shell metacharacters in a crafted /HNAP1 request. This occurs when the GetNetworkTomographyResult function calls the system function with an untrusted input parameter named Address. Consequently, an attacker can execute any command remotely when they control this input.
BDU:2019-00683
Уязвимость функции GetNetworkTomographyResult микропрограммного обеспечения маршрутизатора D–Link DIR-823G, позволяющая нарушителю выполнить произвольные команды операционной системы
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2019-7297 An issue was discovered on D-Link DIR-823G devices with firmware through 1.02B03. A command Injection vulnerability allows attackers to execute arbitrary OS commands via shell metacharacters in a crafted /HNAP1 request. This occurs when the GetNetworkTomographyResult function calls the system function with an untrusted input parameter named Address. Consequently, an attacker can execute any command remotely when they control this input. | CVSS3: 9.8 | 21% Средний | около 7 лет назад | |
GHSA-8jwc-8ww6-25xw An issue was discovered on D-Link DIR-823G devices with firmware through 1.02B03. A command Injection vulnerability allows attackers to execute arbitrary OS commands via shell metacharacters in a crafted /HNAP1 request. This occurs when the GetNetworkTomographyResult function calls the system function with an untrusted input parameter named Address. Consequently, an attacker can execute any command remotely when they control this input. | CVSS3: 9.8 | 21% Средний | больше 3 лет назад | |
BDU:2019-00683 Уязвимость функции GetNetworkTomographyResult микропрограммного обеспечения маршрутизатора D–Link DIR-823G, позволяющая нарушителю выполнить произвольные команды операционной системы | CVSS3: 5.5 | 21% Средний | около 7 лет назад |
Уязвимостей на страницу