Description
An issue was discovered in D-Link DIR-816 A2 1.10 B05 devices. An HTTP request parameter is used in command string construction within the handler function of the /goform/addRouting route. This could lead to Command Injection via Shell Metacharacters.
References
https://github.com/GD008/vuln/blob/main/DIR-816_2.md
ExploitThird Party Advisory
https://www.dlink.com/en/security-bulletin/
Vendor Advisory
https://github.com/GD008/vuln/blob/main/DIR-816_2.md
ExploitThird Party Advisory
https://www.dlink.com/en/security-bulletin/
Vendor Advisory
CVSS impact metrics
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 · Critical
Information
Source identifier
Vulnerability status
Modified
Published
2021-04-14T12:15:13.587Z
4 years agoLast modified
2024-11-21T04:57:21.887Z
1 year ago