Soumettre #691813: D-Link DWR-M920 V1.1.5 Command Injectioninformation

TitreD-Link DWR-M920 V1.1.5 Command Injection
DescriptionDuring a security review of the application, a critical command injection vulnerability was discovered in the “/boafrm/formDebugDiagnosticRun” endpoint. The vulnerability is located within the sub_424B10 function, which calls the sub_4193EC function. This function uses the sprintf function to parse the “host” parameter from an incoming request. The resulting string is then passed directly to the system() function, allowing an attacker to execute arbitrary operating system commands with server privileges.
La source⚠️ https://github.com/LX-LX88/cve/issues/15
Utilisateur
 LX-LX (UID 91683)
Soumission09/11/2025 11:55 (il y a 6 mois)
Modérer17/11/2025 15:22 (8 days later)
StatutAccepté
Entrée VulDB332646 [D-Link DWR-M920/DWR-M921/DIR-822K/DIR-825M 1.1.5 formDebugDiagnosticRun system host élévation de privilèges]
Points20

Do you want to use VulDB in your project?

Use the official API to access entries easily!