setSystemCommand on D-Link DCS-930L devices before 2.12 allows a remote attacker to execute code via an OS command in the SystemCommand parameter.
References
Link | Resource |
---|---|
https://www.exploit-db.com/exploits/39437 | Exploit Third Party Advisory VDB Entry |
https://www.exploit-db.com/exploits/39437 | Exploit Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 02:45
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.exploit-db.com/exploits/39437 - Exploit, Third Party Advisory, VDB Entry |
Information
Published : 2020-03-09 01:15
Updated : 2024-11-21 02:45
NVD link : CVE-2016-11021
Mitre link : CVE-2016-11021
CVE.ORG link : CVE-2016-11021
JSON object : View
Products Affected
dlink
- dcs-930l_firmware
- dcs-930l
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')