Description
An issue was discovered on D-Link DIR-823G devices with firmware through 1.02B03. A command Injection vulnerability allows attackers to execute arbitrary OS commands via shell metacharacters in a crafted /HNAP1 request. This occurs when the GetNetworkTomographyResult function calls the system function with an untrusted input parameter named Address. Consequently, an attacker can execute any command remotely when they control this input.
References (2)
Core 2
Core References
Exploit, Third Party Advisory x_refsource_misc
https://github.com/leonW7/D-Link/blob/master/Vul_1.md
Third Party Advisory vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/106815
Scores
CVSS v3
9.8
EPSS
0.2127
EPSS Percentile
95.7%
Attack Vector
NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
CWE
CWE-78
Status
published
Products (1)
d-link/dir-823g_firmware
< 1.02b03
Published
Jan 31, 2019
Tracked Since
Feb 18, 2026