إرسال #691813: D-Link DWR-M920 V1.1.5 Command Injectionالمعلومات

عنوانD-Link DWR-M920 V1.1.5 Command Injection
الوصفDuring a security review of the application, a critical command injection vulnerability was discovered in the “/boafrm/formDebugDiagnosticRun” endpoint. The vulnerability is located within the sub_424B10 function, which calls the sub_4193EC function. This function uses the sprintf function to parse the “host” parameter from an incoming request. The resulting string is then passed directly to the system() function, allowing an attacker to execute arbitrary operating system commands with server privileges.
المصدر⚠️ https://github.com/LX-LX88/cve/issues/15
المستخدم
 LX-LX (UID 91683)
ارسال09/11/2025 11:55 AM (6 أشهر منذ)
الاعتدال17/11/2025 03:22 PM (8 days later)
الحالةتمت الموافقة
إدخال VulDB332646 [D-Link DWR-M920/DWR-M921/DIR-822K/DIR-825M 1.1.5 formDebugDiagnosticRun system host تجاوز الصلاحيات]
النقاط20

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!