D-link.Router.DDNS.Command.Injection

description-logoDescription

This indicates an attack attempt to exploit a Command Injection Vulnerability in D-link routers.
The vulnerability is due to insufficient sanitizing of user supplied inputs in the application. An unauthenticated remote attacker may be able to exploit this to execute arbitrary commands within the context of the application.

affected-products-logoAffected Products

D-Link DIR-820L (Rev A) ALL
D-Link DIR-820L (Rev B) ALL
D-Link DIR-830L A1
D-Link DIR-810L (Rev A) ALL
D-Link DIR-810L (Rev B) ALL
D-Link DIR-810L (Rev A) ALL
D-Link DIR-826L (Rev A) ALL
D-Link DIR-836L (Rev A)
D-Link DIR-820LW (Rev A)

Impact logoImpact

System Compromise: Remote attackers can gain control of vulnerable systems.

recomended-action-logoRecommended Actions

Currently we are not aware of any vendor supplied patch for this issue.

Version Updates

Date Version Detail
2022-05-31 0.00321

CVE References

CVE-2021-45382