Command Injection Vulnerability in D-Link DIR-823-Pro Router
CVE-2021-46453

9.8CRITICAL

Key Information:

Vendor
D-Link
Vendor
CVE Published:
4 February 2022

Summary

A command injection vulnerability has been identified in the D-Link DIR-823-Pro v1.0.2 router. This issue arises in the SetStaticRouteSettings function where attackers can exploit the staticroute_list parameter to execute arbitrary commands. Such vulnerabilities pose significant risks, allowing unauthorized access and control over affected devices. Users are urged to take immediate action by updating their devices and reviewing security practices to mitigate potential threats.

References

EPSS Score

5% chance of being exploited in the next 30 days.

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.