A vulnerability has been found in D-Link DIR-816 A2 1.10CNB04 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /goform/setDeviceSettings of the component Web Interface. The manipulation of the argument statuscheckpppoeuser leads to os command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-252139.
References
Link | Resource |
---|---|
https://github.com/xiyuanhuaigu/cve/blob/main/rce.md | Exploit Third Party Advisory |
https://vuldb.com/?ctiid.252139 | Permissions Required Third Party Advisory |
https://vuldb.com/?id.252139 | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
No history.
Information
Published : 2024-01-26 14:15
Updated : 2024-05-17 02:35
NVD link : CVE-2024-0921
Mitre link : CVE-2024-0921
CVE.ORG link : CVE-2024-0921
JSON object : View
Products Affected
dlink
- dir-816_a2
- dir-816_a2_firmware
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')