제출 #691813: D-Link DWR-M920 V1.1.5 Command Injection정보

제목D-Link DWR-M920 V1.1.5 Command Injection
설명During a security review of the application, a critical command injection vulnerability was discovered in the “/boafrm/formDebugDiagnosticRun” endpoint. The vulnerability is located within the sub_424B10 function, which calls the sub_4193EC function. This function uses the sprintf function to parse the “host” parameter from an incoming request. The resulting string is then passed directly to the system() function, allowing an attacker to execute arbitrary operating system commands with server privileges.
원천⚠️ https://github.com/LX-LX88/cve/issues/15
사용자
 LX-LX (UID 91683)
제출2025. 11. 09. AM 11:55 (6 개월 ago)
모더레이션2025. 11. 17. PM 03:22 (8 days later)
상태수락
VulDB 항목332646 [D-Link DWR-M920/DWR-M921/DIR-822K/DIR-825M 1.1.5 formDebugDiagnosticRun system host 권한 상승]
포인트들20

Want to know what is going to be exploited?

We predict KEV entries!