The runShellCmd function in systemCheck.htm in D-Link DSR-150 with firmware before 1.08B44; DSR-150N with firmware before 1.05B64; DSR-250 and DSR-250N with firmware before 1.08B44; and DSR-500, DSR-500N, DSR-1000, and DSR-1000N with firmware before 1.08B77 allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) "Ping or Trace an IP Address" or (2) "Perform a DNS Lookup" section.
References
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
AND |
|
Configuration 8 (hide)
AND |
|
History
No history.
Information
Published : 2013-12-19 04:24
Updated : 2024-02-28 12:00
NVD link : CVE-2013-5946
Mitre link : CVE-2013-5946
CVE.ORG link : CVE-2013-5946
JSON object : View
Products Affected
dlink
- dsr-250
- dsr-250n_firmware
- dsr-1000n_firmware
- dsr-500_firmware
- dsr-500n_firmware
- dsr-150n
- dsr-250n
- dsr-150
- dsr-150_firmware
- dsr-500n
- dsr-1000
- dsr-250_firmware
- dsr-150n_firmware
- dsr-500
- dsr-1000_firmware
- dsr-1000n
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')