First published: Mon Apr 12 2021(Updated: )
** UNSUPPORTED WHEN ASSIGNED ** An issue was discovered on D-Link DIR-802 A1 devices through 1.00b05. Universal Plug and Play (UPnP) is enabled by default on port 1900. An attacker can perform command injection by injecting a payload into the Search Target (ST) field of the SSDP M-SEARCH discover packet. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Dlink Dir-802 Firmware | <=1.00b05 | |
Dlink Dir-802 Firmware | =a1 | |
All of | ||
Dlink Dir-802 Firmware | <=1.00b05 | |
Dlink Dir-802 Firmware | =a1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-29379 is classified as a critical vulnerability due to its potential for command injection.
To fix CVE-2021-29379, disable Universal Plug and Play (UPnP) on D-Link DIR-802 devices or update to a firmware version that addresses this vulnerability.
CVE-2021-29379 affects D-Link DIR-802 A1 devices running firmware version 1.00b05 and below.
The exploit method for CVE-2021-29379 involves injecting a malicious payload into the Search Target (ST) field of the SSDP M-SEARCH discover packet.
Yes, CVE-2021-29379 poses a significant risk to network security due to its exploitation via UPnP services.