OS Command Injection in D-Link DIR-882 Routers
CVE-2026-5844
Key Information:
Badges
What is CVE-2026-5844?
A security weakness has been identified in D-Link DIR-882 routers, particularly in the HNAP1 SetNetworkSettings functionality within the prog.cgi file. This vulnerability allows an attacker to manipulate the IPAddress argument, potentially enabling OS command injection from a remote location. Exploitation of this flaw is feasible and poses significant risk to users, particularly as it affects products that are no longer receiving support from D-Link. It is crucial for organizations and individuals using the affected versions to assess their exposure and consider immediate mitigation strategies.
Affected Version(s)
DIR-882 1.01B02
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Timeline
- ๐ก
Public PoC available
- ๐พ
Exploit known to exist
Vulnerability published
Vulnerability Reserved