D-LINK DIR-825 AC1200 R2 is vulnerable to Directory Traversal. An attacker could use the "../../../../" setting of the FTP server folder to set the router's root folder for FTP access. This allows you to access the entire router file system via the FTP server.
References
Link | Resource |
---|---|
https://github.com/Quadron-Research-Lab/Hardware-IoT/blob/main/d-link_dir-825_R2.pdf | Exploit Third Party Advisory |
https://github.com/Quadron-Research-Lab/Hardware-IoT/blob/main/d-link_dir-825_R2.pdf | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 06:58
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/Quadron-Research-Lab/Hardware-IoT/blob/main/d-link_dir-825_R2.pdf - Exploit, Third Party Advisory |
Information
Published : 2022-05-17 14:15
Updated : 2024-11-21 06:58
NVD link : CVE-2022-29332
Mitre link : CVE-2022-29332
CVE.ORG link : CVE-2022-29332
JSON object : View
Products Affected
dlink
- dir-825_firmware
- dir-825
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')