Command Injection Vulnerability in D-Link DIR-878 Devices
CVE-2019-8319

8.8HIGH

Key Information:

Vendor
D-Link
Vendor
CVE Published:
13 February 2019

Summary

A command injection vulnerability has been identified in D-Link DIR-878 devices running firmware version 1.12A1. This security flaw enables remote attackers to execute arbitrary code, gaining unauthorized access through the HNAP API. Specifically, the issue arises when the SetStaticRouteIPv4Settings function processes untrusted input from the request body, allowing the execution of malicious OS commands via crafted POST requests. Attackers can exploit this vulnerability by injecting shell metacharacters into the Gateway field, leading to a potential root shell compromise.

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability Reserved

  • Vulnerability published

.