D-Link DIR-816 A2_v1.10CNB04.img is vulnerable to Command Injection via /goform/SystemCommand. After the user passes in the command parameter, it will be spliced into byte_4836B0 by snprintf, and finally doSystem(&byte_4836B0); will be executed, resulting in a command injection.
References
Link | Resource |
---|---|
https://github.com/z1r00/IOT_Vul/blob/main/dlink/Dir816/SystemCommand/readme.md | Exploit Third Party Advisory |
https://www.dlink.com/en/security-bulletin/ | Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2022-08-31T22:44:57
Updated: 2022-08-31T22:44:57
Reserved: 2022-08-01T00:00:00
Link: CVE-2022-37129
JSON object: View
NVD Information
Status : Analyzed
Published: 2022-08-31T23:15:08.253
Modified: 2023-08-08T14:21:49.707
Link: CVE-2022-37129
JSON object: View
Redhat Information
No data.
CWE