| 제목 | D-Link DWR-M921 V1.1.50 Command Injection |
|---|
| 설명 | During a security review of the D-Link DWR-M921 router firmware, a critical command injection vulnerability was identified in the `/bin/boa` binary).
[cite_start]The vulnerability is located in the function `sub_419920` (as identified in IDA Pro), which handles requests for the `/boafrm/formLtefotaUpgradeQuectel` endpoint. The function retrieves the `fota_url` parameter from the user input. [cite_start]While it checks if the input contains "http://", "https://", or "ftp://", it fails to strictly filter or sanitize the string before passing it to `sprintf` to construct a shell command. |
|---|
| 원천 | ⚠️ https://github.com/LX-66-LX/cve-new/issues/2 |
|---|
| 사용자 | LX-66-LX (UID 92717) |
|---|
| 제출 | 2026. 01. 29. PM 01:35 (3 개월 ago) |
|---|
| 모더레이션 | 2026. 02. 07. AM 11:31 (9 days later) |
|---|
| 상태 | 수락 |
|---|
| VulDB 항목 | 344870 [D-Link DWR-M921 1.1.50 formLtefotaUpgradeQuectel sub_419920 fota_url 권한 상승] |
|---|
| 포인트들 | 20 |
|---|