D-Link.DIR.upnp.MSEARCH.Remote.Command.Execution
Description
This indicates an attack attempt to exploit an Remote Code Injection vulnerability in D-Link DIR-859 device.
The vulnerability is due to insufficient sanitizing of user supplied inputs in the application when handling a crafted UDP request. An unauthenticated remote attacker may be able to exploit this to execute remote code in the context of the system.
Affected Products
D-Link DIR-859 Frimware 1.05
D-Link DIR-859 Frimware 1.06B01 Beta01
Impact
System Compromise: Remote attackers can execute arbitrary code on vulnerable systems.
Recommended Actions
Apply the most recent upgrade or patch from the vendor.
https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10147
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |
Version Updates
Date | Version | Detail |
---|---|---|
2023-12-13 | 26.695 | Name:D-Link. DIR-859. ssdpcgi. Remote. Command. Execution:D-Link. DIR. upnp. MSEARCH. Remote. Command. Execution |
2020-03-03 | 15.787 | Default_action:pass:drop |
2020-02-20 | 15.781 |