提出 #691813: D-Link DWR-M920 V1.1.5 Command Injection情報

タイトルD-Link DWR-M920 V1.1.5 Command Injection
説明During a security review of the application, a critical command injection vulnerability was discovered in the “/boafrm/formDebugDiagnosticRun” endpoint. The vulnerability is located within the sub_424B10 function, which calls the sub_4193EC function. This function uses the sprintf function to parse the “host” parameter from an incoming request. The resulting string is then passed directly to the system() function, allowing an attacker to execute arbitrary operating system commands with server privileges.
ソース⚠️ https://github.com/LX-LX88/cve/issues/15
ユーザー
 LX-LX (UID 91683)
送信2025年11月09日 11:55 (6 月 ago)
モデレーション2025年11月17日 15:22 (8 days later)
ステータス承諾済み
VulDBエントリ332646 [D-Link DWR-M920/DWR-M921/DIR-822K/DIR-825M 1.1.5 formDebugDiagnosticRun system host 特権昇格]
ポイント20

Interested in the pricing of exploits?

See the underground prices here!