Логотип exploitDog
bind:CVE-2022-3210
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2022-3210

Количество 3

Количество 3

nvd логотип

CVE-2022-3210

почти 3 года назад

This vulnerability allows network-adjacent attackers to execute arbitrary commands on affected installations of D-Link DIR-2150 4.0.1 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the xupnpd service, which listens on TCP port 4044 by default. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of the service account. Was ZDI-CAN-15905.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-4j42-3rxm-869g

почти 3 года назад

This vulnerability allows network-adjacent attackers to execute arbitrary commands on affected installations of D-Link DIR-2150 4.0.1 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the xupnpd service, which listens on TCP port 4044 by default. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of the service account. Was ZDI-CAN-15905.

CVSS3: 8.8
EPSS: Низкий
fstec логотип

BDU:2022-05906

почти 4 года назад

Уязвимость службы xupnpd микропрограммного обеспечения маршрутизаторов D-Link DIR-2150, позволяющая нарушителю выполнить произвольные команды

CVSS3: 8.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2022-3210

This vulnerability allows network-adjacent attackers to execute arbitrary commands on affected installations of D-Link DIR-2150 4.0.1 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the xupnpd service, which listens on TCP port 4044 by default. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of the service account. Was ZDI-CAN-15905.

CVSS3: 8.8
0%
Низкий
почти 3 года назад
github логотип
GHSA-4j42-3rxm-869g

This vulnerability allows network-adjacent attackers to execute arbitrary commands on affected installations of D-Link DIR-2150 4.0.1 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the xupnpd service, which listens on TCP port 4044 by default. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of the service account. Was ZDI-CAN-15905.

CVSS3: 8.8
0%
Низкий
почти 3 года назад
fstec логотип
BDU:2022-05906

Уязвимость службы xupnpd микропрограммного обеспечения маршрутизаторов D-Link DIR-2150, позволяющая нарушителю выполнить произвольные команды

CVSS3: 8.8
0%
Низкий
почти 4 года назад

Уязвимостей на страницу