An issue was discovered in soap.cgi?service=WANIPConn1 on D-Link DIR-845 before v1.02b03, DIR-600 before v2.17b01, DIR-645 before v1.04b11, DIR-300 rev. B, and DIR-865 devices. There is Command Injection via shell metacharacters in the NewInternalClient, NewExternalPort, or NewInternalPort element of a SOAP POST request.
References
Link | Resource |
---|---|
https://www.exploit-db.com/exploits/27044 | Exploit Third Party Advisory VDB Entry |
http://www.s3cur1ty.de/m1adv2013-020 | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Information
Published : 2019-06-11 14:29
Updated : 2021-04-23 07:20
NVD link : CVE-2013-7471
Mitre link : CVE-2013-7471
JSON object : View
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
Products Affected
dlink
- dir-600_firmware
- dir-845
- dir-600
- dir-845_firmware
- dir-645
- dir-865
- dir-300
- dir-865_firmware
- dir-645_firmware
- dir-300_firmware