CVE-2022-37129OS Command Injection in Dlink Dir-816 Firmware

Severity
8.8HIGHNVD
EPSS
15.3%
top 5.36%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedAug 31
Latest updateSep 1

Description

D-Link DIR-816 A2_v1.10CNB04.img is vulnerable to Command Injection via /goform/SystemCommand. After the user passes in the command parameter, it will be spliced into byte_4836B0 by snprintf, and finally doSystem(&byte_4836B0); will be executed, resulting in a command injection.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages1 packages

NVDdlink/dir-816_firmware1.10cnb04

🔴Vulnerability Details

3
GHSA
GHSA-fv43-xxv4-v4x9: D-Link DIR-816 A2_v12022-09-01
CVEList
CVE-2022-37129: D-Link DIR-816 A2_v12022-08-31
VulnCheck
D-Link dir-816_firmware Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')2022
CVE-2022-37129 — OS Command Injection in Dlink | cvebase