Remote Command Execution Vulnerability in D-Link DIR-820L Router
CVE-2022-26258

9.8CRITICAL

Key Information:

Vendor

D-Link

Vendor
CVE Published:
28 March 2022

Badges

👾 Exploit Exists🟣 EPSS 89%🦅 CISA Reported

What is CVE-2022-26258?

A remote command execution flaw has been identified in D-Link's DIR-820L router version 1.05B03, which can be exploited via a malicious HTTP POST request. This vulnerability allows attackers to execute arbitrary commands on the device, potentially compromising network security and user data. D-Link users are advised to apply appropriate security measures to mitigate risks associated with this vulnerability. For further details, please refer to the D-Link security bulletin and associated resources.

CISA has reported CVE-2022-26258

CISA provides regional cyber and physical services to support security and resilience across the United States. CISA monitor the most dangerious vulnerabilities and have identifed CVE-2022-26258 as being exploited but is not known by the CISA to be used in ransomware campaigns. This is subject to change at pace

The CISA's recommendation is: The impacted product is end-of-life and should be disconnected if still in use.

References

EPSS Score

89% chance of being exploited in the next 30 days.

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • 👾

    Exploit known to exist

  • 🦅

    CISA Reported

  • Vulnerability published

  • Vulnerability Reserved

.