CVE-2022-50596OS Command Injection in D-link Dir-1260

Severity
9.3CRITICALNVD
EPSS
7.4%
top 8.25%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedNov 6

Description

D-Link DIR-1260 Wi-Fi router firmware versions up to and including v1.20B05 contain a command injection vulnerability within the web management interface that allows for unauthenticated attackers to execute arbitrary commands on the device with root privileges. The flaw specifically exists within the SetDest/Dest/Target arguments to the GetDeviceSettings form. The management interface is accessible over HTTP and HTTPS on the local and Wi-Fi networks and optionally from the Internet.

CVSS vector

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Affected Packages2 packages

CVEListV5d-link/dir-12601.20B05

🔴Vulnerability Details

2
GHSA
GHSA-v3gf-8mqh-c3w6: D-Link DIR-1260 Wi-Fi router firmware versions up to and including v12025-11-06
CVEList
D-Link DIR-1260 <= v1.20B05 GetDeviceSettings Unauthenticated Command Injection2025-11-06
CVE-2022-50596 — OS Command Injection in D-link | cvebase