Gửi #747492: D-Link DIR-823X 250416 OS Command Injectionthông tin

tiêu đềD-Link DIR-823X 250416 OS Command Injection
Mô tảD-Link DIR-823X routers are susceptible to a Remote Command Injection vulnerability via the /goform/set_ddns endpoint. The flaw exists in the backend handling of DDNS (Dynamic DNS) configuration parameters. Due to an incomplete sanitization mechanism that fails to filter newline characters (\n or 0x0A), an authenticated attacker can inject arbitrary shell commands through parameters such as ddnsType, ddnsDomainName, ddnsUserName, or ddnsPwd. When the system commits these configurations to the UCI (Unified Configuration Interface) and restarts the DDNS service, the injected commands are executed with root privileges via the system shell.
Nguồn⚠️ https://github.com/master-abc/cve/issues/25
Người dùng
 jiefengliang (UID 93721)
Đệ trình27/01/2026 17:08 (cách đây 3 các tháng)
Kiểm duyệt06/02/2026 22:09 (10 days later)
Trạng tháiđược chấp nhận
Mục VulDB344778 [D-Link DIR-823X 250416 DDNS Service /goform/set_ddns ddnsType/ddnsDomainName/ddnsUserName/ddnsPwd nâng cao đặc quyền]
điểm20

Do you want to use VulDB in your project?

Use the official API to access entries easily!