First published: Mon Feb 25 2019(Updated: )
An issue was discovered on D-Link DIR-825 Rev.B 2.10 devices. They allow remote attackers to execute arbitrary commands via the ntp_server parameter in an ntp_sync.cgi POST request.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
D-Link DIR-825 Rev.B firmware | =2.10 | |
D-Link DIR-825 Rev.B firmware | ||
D-Link DIR-825 Rev.B firmware | =2.10 | |
D-Link DIR-825 Rev.B firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2019-9122 is high due to the potential for remote command execution.
To fix CVE-2019-9122, update the firmware of D-Link DIR-825 Rev.B devices to a version that addresses this vulnerability.
CVE-2019-9122 allows remote attackers to execute arbitrary commands on affected devices through crafted POST requests.
CVE-2019-9122 specifically affects D-Link DIR-825 Rev.B devices running firmware version 2.10.
Firmware versions older than 2.10 are not specifically mentioned, so it is advisable to upgrade to the latest version to ensure security.