CVE-2022-40719OS Command Injection in Dlink Dir-2150 Firmware

Severity
8.8HIGHNVD
EPSS
1.6%
top 18.19%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 26

Description

This vulnerability allows network-adjacent attackers to execute arbitrary commands on affected installations of D-Link DIR-2150 4.0.1 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the xupnpd_generic.lua plugin for the xupnpd service, which listens on TCP port 4044 by default. When parsing the feed parameter, the process does not properly validate a user-supplied string before using it to execute a system call. An attacker can leverage this

CVSS vector

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages2 packages

CVEListV5d-link/dir-21504.0.1

Patches

🔴Vulnerability Details

2
CVEList
CVE-2022-40719: This vulnerability allows network-adjacent attackers to execute arbitrary commands on affected installations of D-Link DIR-2150 42023-01-26
GHSA
GHSA-236f-jwrv-vrp5: This vulnerability allows network-adjacent attackers to execute arbitrary commands on affected installations of D-Link DIR-2150 42023-01-26
CVE-2022-40719 — OS Command Injection in Dlink | cvebase