D-Link DSL-2750B devices before 1.05 allow remote unauthenticated command injection via the login.cgi cli parameter, as exploited in the wild in 2016 through 2022.
References
Link | Resource |
---|---|
https://seclists.org/fulldisclosure/2016/Feb/53 | Exploit Mailing List Third Party Advisory |
https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10088 | Patch Vendor Advisory |
https://www.exploit-db.com/exploits/44760 | Exploit Third Party Advisory VDB Entry |
https://seclists.org/fulldisclosure/2016/Feb/53 | Exploit Mailing List Third Party Advisory |
https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10088 | Patch Vendor Advisory |
https://www.exploit-db.com/exploits/44760 | Exploit Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 02:47
Type | Values Removed | Values Added |
---|---|---|
References | () https://seclists.org/fulldisclosure/2016/Feb/53 - Exploit, Mailing List, Third Party Advisory | |
References | () https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10088 - Patch, Vendor Advisory | |
References | () https://www.exploit-db.com/exploits/44760 - Exploit, Third Party Advisory, VDB Entry |
Information
Published : 2022-10-19 05:15
Updated : 2024-11-21 02:47
NVD link : CVE-2016-20017
Mitre link : CVE-2016-20017
CVE.ORG link : CVE-2016-20017
JSON object : View
Products Affected
dlink
- dsl-2750b
- dsl-2750b_firmware
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')