제출 #753246: D-Link DIR-815 Firmware 1.01b14 Command Injection정보

제목D-Link DIR-815 Firmware 1.01b14 Command Injection
설명An authenticated command injection vulnerability exists in D-Link DIR-815 firmware version 1.01b14. The CGI endpoint service.cgi resolves to the cgibin executable. The handler function servicecgi_main() retrieves user-controlled parameters such as EVENT and SERVICE from HTTP requests without sufficient sanitization or validation. These parameters are directly passed to lxmldbc_system(), which constructs shell commands using vsnprintf() and executes them via system(). As a result, an authenticated attacker with administrative privileges may inject arbitrary operating system commands and achieve remote code execution on the device.
원천⚠️ https://agreeable-eel-32b.notion.site/Authenticated-Command-Injection-Vulnerability-in-D-Link-DIR-815-service-cgi-Firmware-1-01b14-2ff0bcce666b80e8b931cde0792f7141?source=copy_link
사용자
 Xuhsy (UID 88287)
제출2026. 02. 06. AM 07:39 (3 개월 ago)
모더레이션2026. 02. 08. PM 03:46 (2 days later)
상태중복
VulDB 항목321651 [D-Link DIR-110/DIR-412/DIR-600/DIR-615/DIR-645/DIR-815 1.03 service.cgi 이벤트 권한 상승]
포인트들0

Want to know what is going to be exploited?

We predict KEV entries!