Command Injection Vulnerability in D-Link DIR-825 Router
CVE-2019-9122

8.8HIGH

Key Information:

Vendor
D-Link
Vendor
CVE Published:
25 February 2019

Summary

A command injection vulnerability has been identified in the D-Link DIR-825 Rev.B 2.10 routers. This issue allows remote attackers to execute arbitrary commands by manipulating the ntp_server parameter in a specially crafted ntp_sync.cgi POST request. Exploiting this vulnerability enables unauthorized access to the router's command execution capabilities, posing significant security risks to affected devices. Users are urged to update their routers and employ monitoring practices to safeguard their networks.

References

EPSS Score

9% chance of being exploited in the next 30 days.

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.