Submit #753246: D-Link DIR-815 Firmware 1.01b14 Command Injectioninfo

TitleD-Link DIR-815 Firmware 1.01b14 Command Injection
DescriptionAn authenticated command injection vulnerability exists in D-Link DIR-815 firmware version 1.01b14. The CGI endpoint service.cgi resolves to the cgibin executable. The handler function servicecgi_main() retrieves user-controlled parameters such as EVENT and SERVICE from HTTP requests without sufficient sanitization or validation. These parameters are directly passed to lxmldbc_system(), which constructs shell commands using vsnprintf() and executes them via system(). As a result, an authenticated attacker with administrative privileges may inject arbitrary operating system commands and achieve remote code execution on the device.
Source⚠️ https://agreeable-eel-32b.notion.site/Authenticated-Command-Injection-Vulnerability-in-D-Link-DIR-815-service-cgi-Firmware-1-01b14-2ff0bcce666b80e8b931cde0792f7141?source=copy_link
User
 Xuhsy (UID 88287)
Submission02/06/2026 07:39 (3 months ago)
Moderation02/08/2026 15:46 (2 days later)
StatusDuplicate
VulDB entry321651 [D-Link DIR-110/DIR-412/DIR-600/DIR-615/DIR-645/DIR-815 1.03 service.cgi Event os command injection]
Points0

Want to stay up to date on a daily basis?

Enable the mail alert feature now!