Command Injection Vulnerability in D-Link DIR-816 Router
CVE-2022-28915

9.8CRITICAL

Key Information:

Vendor
D-Link
Vendor
CVE Published:
10 May 2022

Summary

The D-Link DIR-816 A2_v1.10CNB04 router is susceptible to a command injection vulnerability that can be exploited through unauthorized manipulation of the admuser and admpass parameters in the /goform/setSysAdm endpoint. This flaw may allow an attacker to execute arbitrary commands on the affected system, potentially compromising the security and integrity of the device and the network it connects to. Users are encouraged to update their firmware to mitigate this risk.

References

EPSS Score

5% chance of being exploited in the next 30 days.

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.