⚠ Actively exploited
Added to CISA KEV on 2024-09-30. Federal agencies required to patch by 2024-10-21. Required action: The impacted product is end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue utilization of the product..
CVE-2023-25280 — OS Command Injection in Dlink Dir-820l Firmware
Severity
9.8CRITICALNVD
EPSS
93.1%
top 0.20%
CISA KEV
KEV
Added 2024-09-30
Due 2024-10-21
Exploit
Exploited in wild
Active exploitation observed
Affected products
Timeline
PublishedMar 16
KEV addedSep 30
KEV dueOct 21
Latest updateNov 5
CISA Required Action: The impacted product is end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue utilization of the product.
Description
OS Command injection vulnerability in D-Link DIR820LA1_FW105B03 allows attackers to escalate privileges to root via a crafted payload with the ping_addr parameter to ping.ccp.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9
Affected Packages1 packages
🔴Vulnerability Details
3GHSA▶
GHSA-3pm3-vpvc-2wpp: OS Command injection vulnerability in D-Link DIR820LA1_FW105B03 allows attackers to escalate privileges to root via a crafted payload with the ping_ad↗2023-03-16
CVEList▶
CVE-2023-25280: OS Command injection vulnerability in D-Link DIR820LA1_FW105B03 allows attackers to escalate privileges to root via a crafted payload with the ping_ad↗2023-03-16
💥Exploits & PoCs
1Nuclei▶
D-Link DIR820LA1_FW105B03 'ping_addr' - OS Command Injection
🔍Detection Rules
1Suricata
▶