| Título | D-Link DIR-815 Firmware 1.01b14 Command Injection |
|---|
| Descripción | An authenticated command injection vulnerability exists in D-Link DIR-815 firmware version 1.01b14.
The CGI endpoint service.cgi resolves to the cgibin executable. The handler function servicecgi_main() retrieves user-controlled parameters such as EVENT and SERVICE from HTTP requests without sufficient sanitization or validation.
These parameters are directly passed to lxmldbc_system(), which constructs shell commands using vsnprintf() and executes them via system(). As a result, an authenticated attacker with administrative privileges may inject arbitrary operating system commands and achieve remote code execution on the device.
|
|---|
| Fuente | ⚠️ https://agreeable-eel-32b.notion.site/Authenticated-Command-Injection-Vulnerability-in-D-Link-DIR-815-service-cgi-Firmware-1-01b14-2ff0bcce666b80e8b931cde0792f7141?source=copy_link |
|---|
| Usuario | Xuhsy (UID 88287) |
|---|
| Sumisión | 2026-02-06 07:39 (hace 2 meses) |
|---|
| Moderación | 2026-02-08 15:46 (2 days later) |
|---|
| Estado | Duplicado |
|---|
| Entrada de VulDB | 321651 [D-Link DIR-110/DIR-412/DIR-600/DIR-615/DIR-645/DIR-815 1.03 service.cgi Evento escalada de privilegios] |
|---|
| Puntos | 0 |
|---|