제출 #746400: D-Link DWR-M921 V1.1.50 Command Injection정보

제목D-Link DWR-M921 V1.1.50 Command Injection
설명During a security review of the D-Link DWR-M921 router firmware, a critical command injection vulnerability was identified in the USSD configuration endpoint `/boafrm/formUSSDSetup`. The vulnerability exists within the `sub_419F20` function. This function retrieves the user-controlled parameter `ussdValue` and uses `sprintf` to inject it directly into a system command string associated with the `at-mngr` utility. The resulting string is passed to the `system()` function without sufficient sanitization of single quotes, allowing authenticated attackers to break out of the command structure and execute arbitrary OS commands with root privileges.
원천⚠️ https://github.com/LX-66-LX/cve-new/issues/1
사용자 LX-66-LX (UID 92717)
제출2026. 01. 24. PM 03:36 (3 개월 ago)
모더레이션2026. 02. 06. AM 09:20 (13 days later)
상태수락
VulDB 항목344652 [D-Link DWR-M921 1.1.50 USSD Configuration Endpoint /boafrm/formUSSDSetup sub_419F20 ussdValue 권한 상승]
포인트들20

Want to know what is going to be exploited?

We predict KEV entries!