Логотип exploitDog
bind:CVE-2022-40720
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2022-40720

Количество 3

Количество 3

nvd логотип

CVE-2022-40720

около 3 лет назад

This vulnerability allows network-adjacent attackers to execute arbitrary commands on affected installations of D-Link DIR-2150 4.0.1 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the Dreambox plugin for the xupnpd service, which listens on TCP port 4044 by default. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of the router. Was ZDI-CAN-15935.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-x244-8v9r-2f6g

около 3 лет назад

This vulnerability allows network-adjacent attackers to execute arbitrary commands on affected installations of D-Link DIR-2150 4.0.1 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the Dreambox plugin for the xupnpd service, which listens on TCP port 4044 by default. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of the router. Was ZDI-CAN-15935.

CVSS3: 8.8
EPSS: Низкий
fstec логотип

BDU:2022-05911

почти 4 года назад

Уязвимость службы xupnpd микропрограммного обеспечения маршрутизаторов D-Link DIR-2150, позволяющая нарушителю выполнить произвольные команды

CVSS3: 8.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2022-40720

This vulnerability allows network-adjacent attackers to execute arbitrary commands on affected installations of D-Link DIR-2150 4.0.1 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the Dreambox plugin for the xupnpd service, which listens on TCP port 4044 by default. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of the router. Was ZDI-CAN-15935.

CVSS3: 8.8
2%
Низкий
около 3 лет назад
github логотип
GHSA-x244-8v9r-2f6g

This vulnerability allows network-adjacent attackers to execute arbitrary commands on affected installations of D-Link DIR-2150 4.0.1 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the Dreambox plugin for the xupnpd service, which listens on TCP port 4044 by default. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of the router. Was ZDI-CAN-15935.

CVSS3: 8.8
2%
Низкий
около 3 лет назад
fstec логотип
BDU:2022-05911

Уязвимость службы xupnpd микропрограммного обеспечения маршрутизаторов D-Link DIR-2150, позволяющая нарушителю выполнить произвольные команды

CVSS3: 8.8
2%
Низкий
почти 4 года назад

Уязвимостей на страницу