漏洞标题
D-Link DIR-X3260 prog.cgi SOAPAction 命令注入远程代码执行漏洞
漏洞描述信息
D-Link DIR-X3260 prog.cgi SOAPAction命令注入远程代码执行漏洞。此漏洞允许网络相邻的攻击者在受影响的D-Link DIR-X3260路由器上执行任意代码。利用此漏洞不需要身份验证。
具体漏洞存在于处理提供给prog.cgi端点的SOAPAction请求头时。问题在于,在使用用户提供的字符串执行系统调用之前,缺乏对其的有效验证。攻击者可以利用此漏洞以root权限执行代码。此漏洞对应的是ZDI-CAN-20983。
CVSS信息
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
漏洞类别
OS命令中使用的特殊元素转义处理不恰当(OS命令注入)
漏洞标题
D-Link DIR-X3260 prog.cgi SOAPAction Command Injection Remote Code Execution Vulnerability
漏洞描述信息
D-Link DIR-X3260 prog.cgi SOAPAction Command Injection Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DIR-X3260 routers. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the handling of the SOAPAction request header provided to the prog.cgi endpoint. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-20983.
CVSS信息
N/A
漏洞类别
OS命令中使用的特殊元素转义处理不恰当(OS命令注入)
漏洞标题
D-Link DIR-X3260 安全漏洞
漏洞描述信息
D-Link DIR-X3260是中国友讯(D-Link)公司的一款Wi-Fi 6路由器 D-Link DIR-X3260 存在安全漏洞,该漏洞源于命令注入远程代码执行漏洞。
CVSS信息
N/A
漏洞类别
其他