First published: Wed Aug 31 2022(Updated: )
D-link DIR-816 A2_v1.10CNB04.img is vulnerable to Command injection via /goform/form2userconfig.cgi.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Dlink Dir-816 Firmware | =1.10cnb04 | |
Dlink DIR-816 | =a2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this D-link DIR-816 firmware vulnerability is CVE-2022-37123.
The severity level of CVE-2022-37123 is high.
An attacker can exploit the vulnerability in D-link DIR-816 firmware by using command injection via the /goform/form2userconfig.cgi endpoint.
Yes, the D-link DIR-816 A2_v1.10CNB04.img firmware is directly vulnerable to command injection via the /goform/form2userconfig.cgi endpoint.
You can find more information about this vulnerability at the following references: [GitHub - Command injection via /goform/form2userconfig.cgi](https://github.com/z1r00/IOT_Vul/blob/main/dlink/Dir816/form2userconfig_cgi/readme.md) [D-Link Security Bulletin](https://www.dlink.com/en/security-bulletin/)