D-Link device D-Link DIR-823-Pro v1.0.2 was discovered to contain a command injection vulnerability in the function SetNetworkTomographySettings. This vulnerability allows attackers to execute arbitrary commands via the tomography_ping_address, tomography_ping_number, tomography_ping_size, tomography_ping_timeout, and tomography_ping_ttl parameters.
References
Link | Resource |
---|---|
https://github.com/pjqwudi/my_vuln/blob/main/D-link/vuln_27/27.md | Broken Link |
https://www.dlink.com/en/security-bulletin/ | Vendor Advisory |
https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10285 | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Information
Published : 2022-02-03 18:15
Updated : 2022-03-10 06:54
NVD link : CVE-2021-46452
Mitre link : CVE-2021-46452
JSON object : View
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
Products Affected
dlink
- dir-823_pro
- dir-823_pro_firmware