| 제목 | D-Link DIR-823X 250416 OS Command Injection |
|---|
| 설명 | The D-Link DIR-823X router is susceptible to a Remote Command Injection vulnerability via the /goform/set_static_route_table endpoint. The flaw exists in the backend function sub_4175CC, which handles parameters including interface, destip, netmask, gateway, and metric.
While the program calls certain validation functions for specific parameters, it fails to verify the success of these validations and, more importantly, lacks any sanitization for the newline character (\n or 0x0A). An authenticated attacker can inject arbitrary shell commands by using a newline to terminate the intended UCI configuration command and start a new malicious instruction, which is then executed with root privileges. |
|---|
| 원천 | ⚠️ https://github.com/master-abc/cve/issues/28 |
|---|
| 사용자 | jiefengliang (UID 93721) |
|---|
| 제출 | 2026. 01. 28. PM 05:42 (3 개월 ago) |
|---|
| 모더레이션 | 2026. 02. 07. AM 09:29 (10 days later) |
|---|
| 상태 | 수락 |
|---|
| VulDB 항목 | 344859 [D-Link DIR-823X 250416 set_static_route_table sub_4175CC interface/destip/netmask/gateway/metric 권한 상승] |
|---|
| 포인트들 | 20 |
|---|