Command Injection Vulnerability in D-Link DIR-825 Router
CVE-2019-9122
8.8HIGH
Summary
A command injection vulnerability has been identified in the D-Link DIR-825 Rev.B 2.10 routers. This issue allows remote attackers to execute arbitrary commands by manipulating the ntp_server parameter in a specially crafted ntp_sync.cgi POST request. Exploiting this vulnerability enables unauthorized access to the router's command execution capabilities, posing significant security risks to affected devices. Users are urged to update their routers and employ monitoring practices to safeguard their networks.
References
EPSS Score
9% chance of being exploited in the next 30 days.
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved