제출 #747492: D-Link DIR-823X 250416 OS Command Injection정보

제목D-Link DIR-823X 250416 OS Command Injection
설명D-Link DIR-823X routers are susceptible to a Remote Command Injection vulnerability via the /goform/set_ddns endpoint. The flaw exists in the backend handling of DDNS (Dynamic DNS) configuration parameters. Due to an incomplete sanitization mechanism that fails to filter newline characters (\n or 0x0A), an authenticated attacker can inject arbitrary shell commands through parameters such as ddnsType, ddnsDomainName, ddnsUserName, or ddnsPwd. When the system commits these configurations to the UCI (Unified Configuration Interface) and restarts the DDNS service, the injected commands are executed with root privileges via the system shell.
원천⚠️ https://github.com/master-abc/cve/issues/25
사용자
 jiefengliang (UID 93721)
제출2026. 01. 27. PM 05:08 (3 개월 ago)
모더레이션2026. 02. 06. PM 10:09 (10 days later)
상태수락
VulDB 항목344778 [D-Link DIR-823X 250416 DDNS Service /goform/set_ddns ddnsType/ddnsDomainName/ddnsUserName/ddnsPwd 권한 상승]
포인트들20

Interested in the pricing of exploits?

See the underground prices here!