जमा करें #751764: D-Link D-Link DIR-600 v2.15WWb02 Remote Arbitrary Command Executionजानकारी

शीर्षकD-Link D-Link DIR-600 v2.15WWb02 Remote Arbitrary Command Execution
विवरणD-Link DIR-600 is a wireless router designed for home and small office environments, and it is still deployed in certain real-world network environments. In **D-Link DIR-600 firmware v2.15WWb02**, the CGI program `hedwig.cgi` contains a command injection vulnerability. This program obtains parameters via `getenv`. An attacker can craft a malicious request to inject commands into the arguments passed to `lxmldbc_system`, which are ultimately executed through `system`, resulting in remote command execution. This can be leveraged to obtain control privileges such as a reverse shell.
स्रोत⚠️ https://github.com/LonTan0/CVE/blob/main/Remote%20Arbitrary%20Command%20Execution%20Vulnerability%20in%20ssdpcgi%20of%20D-Link%20DIR%E2%80%91600.md
उपयोगकर्ता
 LonTan0 (UID 84934)
सबमिशन04/02/2026 04:03 AM (3 महीनों पहले)
संयम07/02/2026 10:06 AM (3 days later)
स्थितिस्वीकृत
VulDB प्रविष्टि344865 [D-Link DIR-600 तक 2.15WWb02 ssdp.cgi HTTP_ST/REMOTE_ADDR/REMOTE_PORT/SERVER_ID अधिकार वृद्धि]
अंक20

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!