CVE-2021-46456

D-Link device D-Link DIR-823-Pro v1.0.2 was discovered to contain a command injection vulnerability in the function SetWLanACLSettings. This vulnerability allows attackers to execute arbitrary commands via the wl(0).(0)_maclist parameter.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:dlink:dir-823_pro_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:dlink:dir-823_pro:-:*:*:*:*:*:*:*

History

09 Mar 2022, 22:11

Type Values Removed Values Added
CPE cpe:2.3:o:dlink:dir-823_pro_firmware:1.02:*:*:*:*:*:*:* cpe:2.3:o:dlink:dir-823_pro_firmware:*:*:*:*:*:*:*:*
References (MISC) https://github.com/pjqwudi/my_vuln/blob/main/D-link/vuln_26/26.md - Exploit, Third Party Advisory (MISC) https://github.com/pjqwudi/my_vuln/blob/main/D-link/vuln_26/26.md - Broken Link
References (MISC) https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10285 - (MISC) https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10285 - Vendor Advisory

28 Feb 2022, 13:15

Type Values Removed Values Added
References
  • (MISC) https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10285 -

08 Feb 2022, 20:30

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : 7.5
v3 : 9.8
CWE CWE-77
References (MISC) https://github.com/pjqwudi/my_vuln/blob/main/D-link/vuln_26/26.md - (MISC) https://github.com/pjqwudi/my_vuln/blob/main/D-link/vuln_26/26.md - Exploit, Third Party Advisory
References (MISC) https://www.dlink.com/en/security-bulletin/ - (MISC) https://www.dlink.com/en/security-bulletin/ - Vendor Advisory
CPE cpe:2.3:o:dlink:dir-823_pro_firmware:1.02:*:*:*:*:*:*:*
cpe:2.3:h:dlink:dir-823_pro:-:*:*:*:*:*:*:*

04 Feb 2022, 02:15

Type Values Removed Values Added
New CVE

Information

Published : 2022-02-04 02:15

Updated : 2024-02-04 22:08


NVD link : CVE-2021-46456

Mitre link : CVE-2021-46456

CVE.ORG link : CVE-2021-46456


JSON object : View

Products Affected

dlink

  • dir-823_pro
  • dir-823_pro_firmware
CWE
CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')