CVE-2024-0921

A vulnerability has been found in D-Link DIR-816 A2 1.10CNB04 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /goform/setDeviceSettings of the component Web Interface. The manipulation of the argument statuscheckpppoeuser leads to os command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-252139.
References
Link Resource
https://github.com/xiyuanhuaigu/cve/blob/main/rce.md Exploit Third Party Advisory
https://vuldb.com/?ctiid.252139 Permissions Required Third Party Advisory
https://vuldb.com/?id.252139 Third Party Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:dlink:dir-816_a2_firmware:1.10cnb04:*:*:*:*:*:*:*
cpe:2.3:h:dlink:dir-816_a2:-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2024-01-26 14:15

Updated : 2024-05-17 02:35


NVD link : CVE-2024-0921

Mitre link : CVE-2024-0921

CVE.ORG link : CVE-2024-0921


JSON object : View

Products Affected

dlink

  • dir-816_a2
  • dir-816_a2_firmware
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')