Command Injection Vulnerability in D-Link DCS-1130 Devices
CVE-2017-8411
8.8HIGH
Summary
A command injection vulnerability exists in D-Link DCS-1130 devices that allows an attacker to execute arbitrary commands through the device's system API. When a user sets an SMB folder for video clippings, the POST parameters are inadequately sanitized and can be exploited to inject commands. This is due to the interaction of the POST parameters with the vulnerable library function 'sub_1FC4' in 'libmailutils.so'. The exploitation can allow malicious actors to compromise the device by executing commands with the privileges of the device, thus posing a significant risk to security and integrity.
References
EPSS Score
9% chance of being exploited in the next 30 days.
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved