D-Link.DIR-816L.UPnP.Remote.Command.Injection

description-logoDescription

This indicates an attack attempt to exploit an OS Command Injection vulnerability in D-Link DIR-816L devices.
The vulnerability is due to insufficient sanitizing of user supplied inputs in the application. An authenticated remote attacker may be able to exploit this to execute arbitrary commands within the context of the application.

affected-products-logoAffected Products

D-Link DIR-816L with FW v12.06.B09 and prior

Impact logoImpact

System Compromise: Remote attackers can gain control of vulnerable systems.

recomended-action-logoRecommended Actions

Refer to the vendor's advisory for updates:
https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10169

Telemetry logoTelemetry

Coverage

IPS (Regular DB)
IPS (Extended DB)

Version Updates

Date Version Detail
2022-03-23 20.281
2022-03-21 20.279
2020-09-22 16.930 Sig Added
2020-08-20 15.909 Default_action:pass:drop
2020-08-12 15.904