Command Injection Vulnerability in D-Link DIR-816 A2 Devices
CVE-2018-17066
9.8CRITICAL
Summary
A command injection vulnerability exists in D-Link DIR-816 A2 devices due to improper handling of HTTP request parameters. Specifically, the /goform/form2systime.cgi route allows an attacker to manipulate the datetime parameter, potentially leading to unauthorized command execution through shell metacharacters. This vulnerability highlights the importance of robust input validation mechanisms to prevent malicious exploitation.
References
EPSS Score
29% chance of being exploited in the next 30 days.
CVSS V3.1
Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved