First published: Mon Jul 01 2019(Updated: )
An issue was discovered on D-Link DIR-823G devices with firmware 1.02B03. There is a command injection in HNAP1 (exploitable with Authentication) via shell metacharacters in the IPAddress or Gateway field to SetStaticRouteSettings.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Dlink Dir-823g Firmware | =1.02b03 | |
Dlink Dir-823g |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-13128 is a command injection vulnerability in D-Link DIR-823G devices with firmware 1.02B03, which can be exploited with authentication via shell metacharacters in the IPAddress or Gateway field to SetStaticRouteSettings.
CVE-2019-13128 has a severity rating of 8.8, which is considered critical.
To check if your D-Link DIR-823G device is affected by CVE-2019-13128, verify that it is running firmware version 1.02B03.
To fix CVE-2019-13128, you should update your D-Link DIR-823G device firmware to a version that is not vulnerable to this command injection vulnerability.
You can find more information about CVE-2019-13128 in the following reference: https://github.com/TeamSeri0us/pocs/blob/master/iot/dlink/DIR-823G-v2.pdf