Command Injection Vulnerability in D-Link DIR-816 Wireless Router
CVE-2022-37129
8.8HIGH
Summary
The D-Link DIR-816 A2_v1.10CNB04.img is susceptible to a command injection vulnerability through the /goform/SystemCommand endpoint. By injecting commands via the command parameter, an attacker can manipulate the execution flow of the router's firmware, ultimately leading to arbitrary command execution on the device. This flaw poses significant security risks, allowing unauthorized control and compromising the integrity of the network.
References
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved