| Title | D-Link DWR-M920 V1.1.50 Command Injection |
|---|
| Description | A vulnerability has been found in D-Link DWR-M920 V1.1.50. This vulnerability can be triggered through the route /boafrm/formLtefotaUpgradeQuectel. The manipulation of the argument fota_url leads to stack overflow and command injection. The attack is possible to be carried out remotely. The exploit has been disclosed to the public and may be used. |
|---|
| Source | ⚠️ https://github.com/panda666-888/vuls/blob/main/d-link/dwr-m920/formLtefotaUpgradeQuectel.md |
|---|
| User | panda_0x1 (UID 87576) |
|---|
| Submission | 12/24/2025 16:55 (3 months ago) |
|---|
| Moderation | 12/28/2025 10:10 (4 days later) |
|---|
| Status | Accepted |
|---|
| VulDB entry | 338577 [D-Link DWR-M920 up to 1.1.50 formLtefotaUpgradeQuectel sub_415328 fota_url command injection] |
|---|
| Points | 19 |
|---|