D-Link.DIR-816L.UPnP.Remote.Command.Injection
Description
This indicates an attack attempt to exploit an OS Command Injection vulnerability in D-Link DIR-816L devices.
The vulnerability is due to insufficient sanitizing of user supplied inputs in the application. An authenticated remote attacker may be able to exploit this to execute arbitrary commands within the context of the application.
Affected Products
D-Link DIR-816L with FW v12.06.B09 and prior
Impact
System Compromise: Remote attackers can gain control of vulnerable systems.
Recommended Actions
Refer to the vendor's advisory for updates:
https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10169
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |
Version Updates
Date | Version | Detail |
---|---|---|
2022-03-23 | 20.281 | |
2022-03-21 | 20.279 | |
2020-09-22 | 16.930 | Sig Added |
2020-08-20 | 15.909 | Default_action:pass:drop |
2020-08-12 | 15.904 |