⚠ Actively exploited
Added to CISA KEV on 2022-03-25. Federal agencies required to patch by 2022-04-15. Required action: The impacted product is end-of-life and should be disconnected if still in use..

CVE-2016-11021

Severity
7.2HIGH
EPSS
91.3%
top 0.35%
CISA KEV
KEV
Added 2022-03-25
Due 2022-04-15
Exploit
Exploited in wild
Active exploitation observed
Affected products
Timeline
PublishedMar 9
KEV addedMar 25
KEV dueApr 15
Latest updateMay 24
CISA Required Action: The impacted product is end-of-life and should be disconnected if still in use.

Description

setSystemCommand on D-Link DCS-930L devices before 2.12 allows a remote attacker to execute code via an OS command in the SystemCommand parameter.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:HExploitability: 1.2 | Impact: 5.9

Affected Packages1 packages

🔴Vulnerability Details

3
GHSA
GHSA-q7vj-25p7-w99v: setSystemCommand on D-Link DCS-930L devices before 22022-05-24
CVEList
CVE-2016-11021: setSystemCommand on D-Link DCS-930L devices before 22020-03-09
VulnCheck
D-Link DCS-930L Devices OS Command Injection Vulnerability2016

📋Vendor Advisories

1
CISA
D-Link DCS-930L Devices OS Command Injection Vulnerability2022-03-25
CVE-2016-11021 (HIGH CVSS 7.2) | setSystemCommand on D-Link DCS-930L | cvebase.io