D-Link DIR-820L 1.05B03 was discovered to contain remote command execution (RCE) vulnerability via HTTP POST to get set ccp.
References
Link | Resource |
---|---|
http://dir-820l.com | Broken Link |
http://dlink.com | Product |
https://github.com/skyedai910/Vuln/tree/master/DIR-820L/command_execution_0 | Broken Link Exploit Third Party Advisory |
https://github.com/zhizhuoshuma/cve_info_data/blob/ccaed4b94ba762eb8a8e003bfa762a7754b8182e/Vuln/Vuln/DIR-820L/command_execution_0/README.md | Exploit Third Party Advisory |
https://www.dlink.com/en/security-bulletin/ | Not Applicable Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
No history.
Information
Published : 2022-03-28 00:15
Updated : 2024-06-28 14:04
NVD link : CVE-2022-26258
Mitre link : CVE-2022-26258
CVE.ORG link : CVE-2022-26258
JSON object : View
Products Affected
dlink
- dir-820l
- dir-820l_firmware
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')