إرسال #748838: D-Link DWR-M921 V1.1.50 Command Injectionالمعلومات

عنوانD-Link DWR-M921 V1.1.50 Command Injection
الوصفDuring a security review of the D-Link DWR-M921 router firmware, a critical command injection vulnerability was identified in the `/bin/boa` binary). [cite_start]The vulnerability is located in the function `sub_419920` (as identified in IDA Pro), which handles requests for the `/boafrm/formLtefotaUpgradeQuectel` endpoint. The function retrieves the `fota_url` parameter from the user input. [cite_start]While it checks if the input contains "http://", "https://", or "ftp://", it fails to strictly filter or sanitize the string before passing it to `sprintf` to construct a shell command.
المصدر⚠️ https://github.com/LX-66-LX/cve-new/issues/2
المستخدم LX-66-LX (UID 92717)
ارسال29/01/2026 01:35 PM (3 أشهر منذ)
الاعتدال07/02/2026 11:31 AM (9 days later)
الحالةتمت الموافقة
إدخال VulDB344870 [D-Link DWR-M921 1.1.50 formLtefotaUpgradeQuectel sub_419920 fota_url تجاوز الصلاحيات]
النقاط20

Want to stay up to date on a daily basis?

Enable the mail alert feature now!