We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-0921

D-Link DIR-816 A2 Web Interface setDeviceSettings os command injection



AssignerVulDB
Reserved2024-01-26
Published2024-01-26
Updated2024-10-18

Description

EN DE

A vulnerability has been found in D-Link DIR-816 A2 1.10CNB04 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /goform/setDeviceSettings of the component Web Interface. The manipulation of the argument statuscheckpppoeuser leads to os command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-252139.

In D-Link DIR-816 A2 1.10CNB04 wurde eine Schwachstelle gefunden. Sie wurde als kritisch eingestuft. Hierbei betrifft es unbekannten Programmcode der Datei /goform/setDeviceSettings der Komponente Web Interface. Durch Manipulieren des Arguments statuscheckpppoeuser mit unbekannten Daten kann eine os command injection-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff über das Netzwerk. Der Exploit steht zur öffentlichen Verfügung.



MEDIUM: 4.7CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L
MEDIUM: 4.7CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L
5.8CVSS:2.0/AV:N/AC:L/Au:M/C:P/I:P/A:P

Product status

1.10CNB04
affected

Timeline

2024-01-26:Advisory disclosed
2024-01-26:VulDB entry created
2024-01-26:VulDB entry last update

Credits

xiyuanhuaigu (VulDB User) reporter

References

https://vuldb.com/?id.252139 vdb-entry technical-description

https://vuldb.com/?ctiid.252139 signature permissions-required

https://github.com/xiyuanhuaigu/cve/blob/main/rce.md exploit

cve.org CVE-2024-0921

nvd.nist.gov CVE-2024-0921

Download JSON

Share this page
https://cve.threatint.com
Subscribe to our newsletter to learn more about our work.