The DHCP client on D-Link DIR-850L REV. A (with firmware through FW114WWb07_h2ab_beta1) and REV. B (with firmware through FW208WWb02) devices allows unauthenticated remote code execution as root because /etc/services/INET/inet_ipv4.php mishandles shell metacharacters, affecting generated files such as WAN-1-udhcpc.sh.
References
Link | Resource |
---|---|
https://pierrekim.github.io/blog/2017-09-08-dlink-850l-mydlink-cloud-0days-vulnerabilities.html | Exploit Third Party Advisory |
Information
Published : 2017-09-13 10:29
Updated : 2019-10-02 17:03
NVD link : CVE-2017-14429
Mitre link : CVE-2017-14429
JSON object : View
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Products Affected
d-link
- dir-850l
- dir-850l_firmware