Command Injection Vulnerability in D-Link DIR-816 and DIR-878 Smart Routers
CVE-2022-37130
9.8CRITICAL
Summary
A command injection vulnerability has been identified in the D-Link DIR-816 and DIR-878 smart routers. This flaw exists within the /goform/Diagnosis functionality, where unsanitized user input can lead to unauthorized command execution on the device. The vulnerability allows an attacker to manipulate the 'setnum' parameter, which can subsequently be inserted into various system commands through the snprintf function. Successful exploitation of this vulnerability may allow a malicious actor to execute arbitrary commands on the affected device, posing serious risks to network integrity and security.
References
EPSS Score
73% chance of being exploited in the next 30 days.
CVSS V3.1
Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved