First published: Wed Aug 31 2022(Updated: )
D-Link DIR-816 A2_v1.10CNB04.img is vulnerable to Command Injection via /goform/SystemCommand. After the user passes in the command parameter, it will be spliced into byte_4836B0 by snprintf, and finally doSystem(&byte_4836B0); will be executed, resulting in a command injection.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Dlink Dir-816 Firmware | =1.10cnb04 | |
Dlink DIR-816 | =a2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2022-37129.
The severity of CVE-2022-37129 is high with a CVSS score of 8.8.
The vulnerability allows an attacker to inject malicious commands into the system, potentially leading to unauthorized access, data loss, or remote code execution.
You can check the firmware version of your D-Link DIR-816 router to see if it is running version 1.10cnb04, which is vulnerable to CVE-2022-37129.
To fix the vulnerability, update the firmware of your D-Link DIR-816 router to a version that has addressed the command injection issue.