Description
D-Link DIR-1260 Wi-Fi router firmware versions up to and including v1.20B05 contain a command injection vulnerability within the web management interface that allows for unauthenticated attackers to execute arbitrary commands on the device with root privileges. The flaw specifically exists within the SetDest/Dest/Target arguments to the GetDeviceSettings form. The management interface is accessible over HTTP and HTTPS on the local and Wi-Fi networks and optionally from the Internet.
Problem types
CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Product status
Any version
Timeline
| 2022-05-11: | Exodus Intelligence publicly discloses technical details of vulnerability. |
| 2022-05-05: | D-Link releases patched version - v1.02B06_Beta Hotfix. |
Credits
Exodus Intelligence
References
supportannouncement.us.dlink.com/...ation.aspx?name=SAP10298
blog.exodusintel.com/...uth-command-injection-vulnerability/
www.vulncheck.com/...tings-unauthenticated-command-injection