A command injection vulnerability in the protest binary allows an attacker with access to the remote command line interface to execute arbitrary commands as root.
References
Link | Resource |
---|---|
https://www.tenable.com/security/research/tra-2022-09 | Exploit Third Party Advisory |
https://www.tenable.com/security/research/tra-2022-09 | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
AND |
|
Configuration 8 (hide)
AND |
|
Configuration 9 (hide)
AND |
|
Configuration 10 (hide)
AND |
|
Configuration 11 (hide)
AND |
|
Configuration 12 (hide)
AND |
|
Configuration 13 (hide)
AND |
|
Configuration 14 (hide)
AND |
|
Configuration 15 (hide)
AND |
|
Configuration 16 (hide)
AND |
|
Configuration 17 (hide)
AND |
|
Configuration 18 (hide)
AND |
|
History
21 Nov 2024, 06:40
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.tenable.com/security/research/tra-2022-09 - Exploit, Third Party Advisory |
18 Apr 2022, 14:31
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-78 | |
References | (MISC) https://www.tenable.com/security/research/tra-2022-09 - Exploit, Third Party Advisory | |
CPE | cpe:2.3:o:dlink:dir-3040_firmware:1.13b03:beta:*:*:*:*:*:* cpe:2.3:h:dlink:dir-2660:-:*:*:*:*:*:*:* cpe:2.3:o:dlink:dir-867_firmware:1.20b10:*:*:*:*:*:*:* cpe:2.3:o:dlink:dir-2660_firmware:1.00b14:*:*:*:*:*:*:* cpe:2.3:h:dlink:dir-3040:a1:*:*:*:*:*:*:* cpe:2.3:o:dlink:dir-882_firmware:1.20b06:*:*:*:*:*:*:* cpe:2.3:o:dlink:dir-3060_firmware:1.02b03:*:*:*:*:*:*:* cpe:2.3:h:dlink:dir-867:a1:*:*:*:*:*:*:* cpe:2.3:h:dlink:dir-878:-:*:*:*:*:*:*:* cpe:2.3:o:dlink:dir-1760_firmware:1.11b03:beta:*:*:*:*:*:* cpe:2.3:h:dlink:dir-1960:a1:*:*:*:*:*:*:* cpe:2.3:o:dlink:dir-2660_firmware:1.02b01:*:*:*:*:*:*:* cpe:2.3:o:dlink:dir-2640_firmware:1.01b04:*:*:*:*:*:*:* cpe:2.3:o:dlink:dir-1360_firmware:1.11b04:beta:*:*:*:*:*:* cpe:2.3:o:dlink:dir-1960_firmware:1.11b03:beta:*:*:*:*:*:* cpe:2.3:o:dlink:dir-3040_firmware:1.12b01:*:*:*:*:*:*:* cpe:2.3:o:dlink:dir-1360_firmware:1.01b03:*:*:*:*:*:*:* cpe:2.3:o:dlink:dir-3060_firmware:1.11b02:*:*:*:*:*:*:* cpe:2.3:h:dlink:dir-1360:-:*:*:*:*:*:*:* cpe:2.3:o:dlink:dir-878_firmware:1.30b08:*:*:*:*:*:*:* cpe:2.3:o:dlink:dir-1760_firmware:1.01b04:*:*:*:*:*:*:* cpe:2.3:o:dlink:dir-3060_firmware:1.11b04:*:*:*:*:*:*:* cpe:2.3:o:dlink:dir-3060_firmware:1.00b12:*:*:*:*:*:*:* cpe:2.3:h:dlink:dir-867:-:*:*:*:*:*:*:* cpe:2.3:o:dlink:dir-882_firmware:1.30b06:*:*:*:*:*:*:* cpe:2.3:o:dlink:dir-1960_firmware:1.02b01:*:*:*:*:*:*:* cpe:2.3:h:dlink:dir-2660:a1:*:*:*:*:*:*:* cpe:2.3:o:dlink:dir-1960_firmware:1.11b03:*:*:*:*:*:*:* cpe:2.3:o:dlink:dir-2640_firmware:1.11b02:beta:*:*:*:*:*:* cpe:2.3:o:dlink:dir-3060_firmware:1.11b04:beta:*:*:*:*:*:* cpe:2.3:o:dlink:dir-1360_firmware:1.02b03:*:*:*:*:*:*:* cpe:2.3:o:dlink:dir-3060_firmware:1.01b07:*:*:*:*:*:*:* cpe:2.3:o:dlink:dir-2660_firmware:1.04b03:*:*:*:*:*:*:* cpe:2.3:h:dlink:dir-2640:-:*:*:*:*:*:*:* cpe:2.3:h:dlink:dir-1960:-:*:*:*:*:*:*:* cpe:2.3:o:dlink:dir-1360_firmware:1.00b15:*:*:*:*:*:*:* cpe:2.3:o:dlink:dir-2660_firmware:1.11b04:beta:*:*:*:*:*:* cpe:2.3:o:dlink:dir-2640_firmware:1.11b02:*:*:*:*:*:*:* cpe:2.3:o:dlink:dir-882_firmware:1.30b10:*:*:*:*:*:*:* cpe:2.3:o:dlink:dir-1960_firmware:1.03b03:*:*:*:*:*:*:* cpe:2.3:o:dlink:dir-1360_firmware:1.11b04:*:*:*:*:*:*:* cpe:2.3:o:dlink:dir-867_firmware:1.30b07:*:*:*:*:*:*:* cpe:2.3:h:dlink:dir-1760:-:*:*:*:*:*:*:* cpe:2.3:h:dlink:dir-3060:-:*:*:*:*:*:*:* cpe:2.3:o:dlink:dir-2660_firmware:1.11b04:*:*:*:*:*:*:* cpe:2.3:h:dlink:dir-882:-:*:*:*:*:*:*:* cpe:2.3:h:dlink:dir-2640:a1:*:*:*:*:*:*:* cpe:2.3:o:dlink:dir-878_firmware:1.20b05:*:*:*:*:*:*:* cpe:2.3:o:dlink:dir-3040_firmware:1.20b03:*:*:*:*:*:*:* cpe:2.3:o:dlink:dir-3040_firmware:1.11b02:*:*:*:*:*:*:* cpe:2.3:h:dlink:dir-882:a1:*:*:*:*:*:*:* cpe:2.3:o:dlink:dir-2660_firmware:1.03b04:*:*:*:*:*:*:* cpe:2.3:h:dlink:dir-3040:-:*:*:*:*:*:*:* cpe:2.3:h:dlink:dir-1360:a1:*:*:*:*:*:*:* cpe:2.3:o:dlink:dir-2660_firmware:1.01b03:*:*:*:*:*:*:* cpe:2.3:o:dlink:dir-867_firmware:1.10b04:*:*:*:*:*:*:* cpe:2.3:h:dlink:dir-3060:a1:*:*:*:*:*:*:* cpe:2.3:o:dlink:dir-3040_firmware:1.13b03:*:*:*:*:*:*:* cpe:2.3:o:dlink:dir-1360_firmware:1.03b02:*:*:*:*:*:*:* |
|
CVSS |
v2 : v3 : |
v2 : 7.2
v3 : 7.8 |
11 Apr 2022, 20:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-04-11 20:15
Updated : 2024-11-21 06:40
NVD link : CVE-2022-1262
Mitre link : CVE-2022-1262
CVE.ORG link : CVE-2022-1262
JSON object : View
Products Affected
dlink
- dir-3040_firmware
- dir-2660
- dir-3040
- dir-1760_firmware
- dir-882_firmware
- dir-2640_firmware
- dir-2660_firmware
- dir-1360_firmware
- dir-867_firmware
- dir-1360
- dir-867
- dir-1760
- dir-878
- dir-3060_firmware
- dir-3060
- dir-1960
- dir-878_firmware
- dir-2640
- dir-882
- dir-1960_firmware
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')