An issue was discovered on D-Link DIR-825 Rev.B 2.10 devices. They allow remote attackers to execute arbitrary commands via the ntp_server parameter in an ntp_sync.cgi POST request.
References
Link | Resource |
---|---|
https://github.com/WhooAmii/whooamii.github.io/blob/master/2018/DIR-825/command%20injection.md | Exploit Third Party Advisory |
https://github.com/WhooAmii/whooamii.github.io/blob/master/2018/DIR-825/command%20injection.md | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 04:51
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/WhooAmii/whooamii.github.io/blob/master/2018/DIR-825/command%20injection.md - Exploit, Third Party Advisory |
Information
Published : 2019-02-25 05:29
Updated : 2024-11-21 04:51
NVD link : CVE-2019-9122
Mitre link : CVE-2019-9122
CVE.ORG link : CVE-2019-9122
JSON object : View
Products Affected
dlink
- dir-825_rev.b_firmware
- dir-825_rev.b
CWE