First published: Tue Mar 30 2021(Updated: )
D-link DIR-816 A2 v1.10 is affected by a remote code injection vulnerability. An HTTP request parameter can be used in command string construction in the handler function of the /goform/dir_setWanWifi, which can lead to command injection via shell metacharacters in the statuscheckpppoeuser parameter.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Dlink Dir-816 Firmware | =1.10b05 | |
Dlink DIR-816 | =a2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-26810 is a remote code injection vulnerability that affects the D-link DIR-816 A2 v1.10 router firmware.
CVE-2021-26810 allows an attacker to inject malicious code by manipulating an HTTP request parameter in the /goform/dir_setWanWifi handler function.
CVE-2021-26810 has a severity rating of 9.8 (Critical).
D-link DIR-816 A2 v1.10b05 firmware is affected by CVE-2021-26810.
To fix CVE-2021-26810, update your D-link DIR-816 router firmware to a non-vulnerable version provided by D-link.