提交 #749263: D-Link DIR-823X 250416 OS Command Injection信息

标题D-Link DIR-823X 250416 OS Command Injection
描述The D-Link DIR-823X router is susceptible to a Remote Command Injection vulnerability via the /goform/set_upnp endpoint. The flaw exists in the backend function sub_420618, which fails to adequately filter the newline character (\n or 0x0A) when handling the upnp_enable parameter. An authenticated attacker can inject arbitrary shell commands by using a newline to terminate the intended UCI configuration command and initiate a malicious instruction. These commands are subsequently executed with root privileges.
来源⚠️ https://github.com/master-abc/cve/issues/31
用户
 jiefengliang (UID 93721)
提交2026-01-30 11時40分 (3 月前)
管理2026-02-07 15時58分 (8 days later)
状态已接受
VulDB条目344876 [D-Link DIR-823X 250416 /goform/set_upnp sub_420618 upnp_enable 权限提升]
积分20

Do you need the next level of professionalism?

Upgrade your account now!