D-Link DIR-822+ V1.0.5 was found to contain a command injection in SetPlcNetworkpwd function of prog.cgi, which allows remote attackers to execute arbitrary commands via shell.
The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.
Link | Tags |
---|---|
http://www.dlink.com.cn/techsupport/ProductInfo.aspx?m=DIR-822%2B | product |
https://github.com/n0wstr/IOTVuln/tree/main/DIR-822%2B/SetPlcNetworkpwd | third party advisory exploit |