| 标题 | D-Link DWR-M921 V1.1.50 Command Injection |
|---|
| 描述 | During a security review of the D-Link DWR-M921 router firmware, a critical command injection vulnerability was identified in the USSD configuration endpoint `/boafrm/formUSSDSetup`. The vulnerability exists within the `sub_419F20` function. This function retrieves the user-controlled parameter `ussdValue` and uses `sprintf` to inject it directly into a system command string associated with the `at-mngr` utility. The resulting string is passed to the `system()` function without sufficient sanitization of single quotes, allowing authenticated attackers to break out of the command structure and execute arbitrary OS commands with root privileges. |
|---|
| 来源 | ⚠️ https://github.com/LX-66-LX/cve-new/issues/1 |
|---|
| 用户 | LX-66-LX (UID 92717) |
|---|
| 提交 | 2026-01-24 15時36分 (3 月前) |
|---|
| 管理 | 2026-02-06 09時20分 (13 days later) |
|---|
| 状态 | 已接受 |
|---|
| VulDB条目 | 344652 [D-Link DWR-M921 1.1.50 USSD Configuration Endpoint /boafrm/formUSSDSetup sub_419F20 ussdValue 权限提升] |
|---|
| 积分 | 20 |
|---|