D-link.Router.DDNS.Command.Injection
Description
This indicates an attack attempt to exploit a Command Injection Vulnerability in D-link routers.
The vulnerability is due to insufficient sanitizing of user supplied inputs in the application. An unauthenticated remote attacker may be able to exploit this to execute arbitrary commands within the context of the application.
Affected Products
D-Link DIR-820L (Rev A) ALL
D-Link DIR-820L (Rev B) ALL
D-Link DIR-830L A1
D-Link DIR-810L (Rev A) ALL
D-Link DIR-810L (Rev B) ALL
D-Link DIR-810L (Rev A) ALL
D-Link DIR-826L (Rev A) ALL
D-Link DIR-836L (Rev A)
D-Link DIR-820LW (Rev A)
Impact
System Compromise: Remote attackers can gain control of vulnerable systems.
Recommended Actions
Currently we are not aware of any vendor supplied patch for this issue.
Version Updates
Date | Version | Detail |
---|---|---|
2022-05-31 | 0.00321 |