9
CVSSv2

CVE-2019-8313

Published: 13/02/2019 Updated: 23/04/2021
CVSS v2 Base Score: 9 | Impact Score: 10 | Exploitability Score: 8
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 802
Vector: AV:N/AC:L/Au:S/C:C/I:C/A:C

Vulnerability Summary

An issue exists on D-Link DIR-878 devices with firmware 1.12A1. This issue is a Command Injection allowing a remote malicious user to execute arbitrary code, and get a root shell. A command Injection vulnerability allows malicious users to execute arbitrary OS commands via a crafted /HNAP1 POST request. This occurs when any HNAP API function triggers a call to the twsystem function with untrusted input from the request body for the SetIPv6FirewallSettings API function, as demonstrated by shell metacharacters in the SrcIPv6AddressRangeStart field.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

dlink dir-878_firmware 1.12a1