Soumettre #617359: D-Link DIR-816L <= v2.06B01 remote commendinformation

TitreD-Link DIR-816L <= v2.06B01 remote commend
DescriptionThe program obtains environment variable parameters through getenv and only filters backtick characters, without restricting other command symbols. Attackers can construct strings like "ssdp:all+command" to control the parameters passed to lxmldbc_system, ultimately exploiting the internal sprintf + system calls to achieve command injection, thereby accomplishing remote code execution.
La source⚠️ https://github.com/bananashipsBBQ/CVE/blob/main/D-Link%20DIR-816L%20Remote%20Arbitrary%20Command%20Execution%20Vulnerability%20in%20ssdpcgi.md
Utilisateur
 bananaship (UID 88011)
Soumission16/07/2025 18:53 (il y a 9 mois)
Modérer18/07/2025 21:26 (2 days later)
StatutAccepté
Entrée VulDB316939 [D-Link DIR-816L jusqu’à 2.06B01 Environment Variable /htdocs/cgibin lxmldbc_system élévation de privilèges]
Points20

Want to know what is going to be exploited?

We predict KEV entries!