First published: Tue Aug 24 2021(Updated: )
An issue was discovered in D-Link DIR-816 DIR-816A2_FWv1.10CNB05_R1B011D88210 The HTTP request parameter is used in the handler function of /goform/form2userconfig.cgi route, which can construct the user name string to delete the user function. This can lead to command injection through shell metacharacters.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Dlink Dir-816 Firmware | =1.10cnb05_r1b011d88210 | |
Dlink DIR-816 | =a2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2021-39509 is critical with a score of 9.8.
CVE-2021-39509 affects D-Link DIR-816 Firmware version 1.10cnb05_r1b011d88210.
CVE-2021-39509 allows for command injection through shell metacharacters, which can lead to unauthorized execution of commands.
At the moment, there are no known fixes or patches available for CVE-2021-39509. It is recommended to follow the vendor's security bulletin for updates.
You can find more information about CVE-2021-39509 at the following sources: [GitHub - doudoudedi/main-DIR-816_A2_Command-injection](https://github.com/doudoudedi/main-DIR-816_A2_Command-injection), [GitHub - doudoudedi/main-DIR-816_A2_Command-injection/blob/main/injection.md](https://github.com/doudoudedi/main-DIR-816_A2_Command-injection/blob/main/injection.md), [D-Link Security Bulletin](https://www.dlink.com/en/security-bulletin/).