Command Injection Vulnerability in D-Link DIR-816 Routers
CVE-2022-37125
9.8CRITICAL
Summary
The D-Link DIR-816 router is susceptible to a command injection vulnerability through its /goform/NTPSyncWithHost interface. This flaw allows an authenticated attacker to send specially crafted requests that can execute arbitrary commands on the affected system. Users are encouraged to review their router settings and apply firmware updates to mitigate this risk. For more detailed information, visit the D-Link security bulletin or refer to community findings on GitHub.
References
EPSS Score
5% chance of being exploited in the next 30 days.
CVSS V3.1
Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved