D-Link DIR-1260 GetDeviceSettings Pre-Auth Command Injection Vulnerability
2022-5-12 01:59:8 Author: blog.exodusintel.com(查看原文) 阅读量:54 收藏

EIP-3b20d7b3

A command injection vulnerability exists within the web management interface of the D-Link DIR-1260 Wi-Fi router that allows for unauthenticated attackers to execute arbitrary commands on the device with root privileges. The flaw specifically exists within the SetDest/Dest/Target arguments to the GetDeviceSettings form. The management interface is accessible over HTTP and HTTPS on the local and Wi-Fi networks and optionally from the Internet.

Vulnerability Identifiers

  • Exodus Intelligence: EIP-3b20d7b3
  • MITRE CVE: TBD

Vulnerability Metrics

  • CVSSv2 Score: 8.3

Vendor References

Discovery Credit

  • Exodus Intelligence

Disclosure Timeline

  • Disclosed to affected vendor: March 2nd, 2022
  • Disclosed to public: May 11th, 2022

Further Information

Readers of this advisory who are interested in receiving further details around the vulnerability, mitigations, detection guidance, and more can contact us at [email protected].

Researchers who are interested in monetizing their 0Day and NDay can work with us through our Research Sponsorship Program.


文章来源: https://blog.exodusintel.com/2022/05/11/d-link-dir-1260-getdevicesettings-pre-auth-command-injection-vulnerability/?utm_source=rss&utm_medium=rss&utm_campaign=d-link-dir-1260-getdevicesettings-pre-auth-command-injection-vulnerability
如有侵权请联系:admin#unsafe.sh