Arbitrary Command Execution Vulnerability in D-Link Router DIR-846
CVE-2020-27600

9.8CRITICAL

Key Information:

Vendor
D-Link
Vendor
CVE Published:
2 April 2021

Summary

A vulnerability in the D-Link Router DIR-846 allows remote attackers to execute arbitrary commands on the device. This occurs due to improper handling of input parameters in the HNAP1/control/SetMasterWLanSettings.php file. Attackers can exploit this flaw by injecting shell metacharacters into the ssid0 or ssid1 parameters, potentially gaining unauthorized control over the router. It is crucial for users to be aware of this vulnerability and apply any available security updates provided by D-Link to mitigate risks.

References

EPSS Score

76% chance of being exploited in the next 30 days.

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.