OS Command Injection Vulnerability in D-Link DIR-620 Devices
CVE-2018-6211
7.2HIGH
Summary
The D-Link DIR-620 devices, particularly those using specific customized firmware versions (1.0.3, 1.0.37, 1.3.1, 1.3.3, 1.3.7, 1.4.0, and 2.0.22), are susceptible to OS command injection due to improper handling of the res_buf parameter in index.cgi. This flaw may permit attackers to execute arbitrary OS commands, potentially compromising the device's integrity and exposing sensitive information on the network. Users of affected devices should urgently review their firmware and apply any security patches provided by D-Link to mitigate this risk.
References
EPSS Score
17% chance of being exploited in the next 30 days.
CVSS V3.1
Score:
7.2
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved