| عنوان | D-Link DIR-816L <= v2.06B01 remote commend |
|---|
| الوصف | The program obtains environment variable parameters through getenv and only filters backtick characters, without restricting other command symbols. Attackers can construct strings like "ssdp:all+command" to control the parameters passed to lxmldbc_system, ultimately exploiting the internal sprintf + system calls to achieve command injection, thereby accomplishing remote code execution. |
|---|
| المصدر | ⚠️ https://github.com/bananashipsBBQ/CVE/blob/main/D-Link%20DIR-816L%20Remote%20Arbitrary%20Command%20Execution%20Vulnerability%20in%20ssdpcgi.md |
|---|
| المستخدم | bananaship (UID 88011) |
|---|
| ارسال | 16/07/2025 06:53 PM (9 أشهر منذ) |
|---|
| الاعتدال | 18/07/2025 09:26 PM (2 days later) |
|---|
| الحالة | تمت الموافقة |
|---|
| إدخال VulDB | 316939 [D-Link DIR-816L حتى 2.06B01 Environment Variable /htdocs/cgibin lxmldbc_system تجاوز الصلاحيات] |
|---|
| النقاط | 20 |
|---|