First published: Wed Aug 31 2022(Updated: )
In D-Link DIR-816 A2_v1.10CNB04, DIR-878 DIR_878_FW1.30B08.img a command injection vulnerability occurs in /goform/Diagnosis, after the condition is met, setnum will be spliced into v10 by snprintf, and the system will be executed, resulting in a command injection vulnerability
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Dlink Dir-816 Firmware | =1.10cnb04 | |
Dlink DIR-816 | =a2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2022-37130.
The severity level of CVE-2022-37130 is critical with a score of 9.8.
The command injection vulnerability occurs in /goform/Diagnosis where the parameter 'setnum' is spliced into 'v10' by snprintf, allowing system execution.
The affected software version of D-Link DIR-816 A2_v1.10CNB04 is 1.10cnb04.
No, D-Link DIR-816 A2 is not vulnerable to this command injection vulnerability.