Отправить #556433: D-Link DIR-880L <=104WWb01 Command executionИнформация

НазваниеD-Link DIR-880L <=104WWb01 Command execution
ОписаниеD-Link router DIR-880L 104WWb01 version has a serious command injection vulnerability. An attacker can set the request header through the path /htdocs/ssdpcgi and inject commands through the function sub_16570() to achieve remote command execution and even cause serious consequences. An attacker can use this vulnerability to execute arbitrary code by sending a specially constructed payload to port 49152.
Источник⚠️ https://github.com/CH13hh/tmp_store_cc/blob/main/DIR-880L/1.md
Пользователь
 BabyShark (UID 83915)
Представление11.04.2025 10:18 (1 Год назад)
Модерация05.05.2025 18:54 (24 days later)
Статуспринято
Запись VulDB307459 [D-Link DIR-880L до 104WWb01 Request Header /htdocs/ssdpcgi sub_16570 HTTP_ST/REMOTE_ADDR/REMOTE_PORT/SERVER_ID эскалация привилегий]
Баллы20