CVE-2022-26258

D-Link DIR-820L 1.05B03 was discovered to contain remote command execution (RCE) vulnerability via HTTP POST to get set ccp.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:dlink:dir-820l_firmware:1.05:b03:*:*:*:*:*:*
cpe:2.3:h:dlink:dir-820l:-:*:*:*:*:*:*:*

History

28 Jun 2024, 14:04

Type Values Removed Values Added
References () http://dlink.com - Vendor Advisory () http://dlink.com - Product
References () https://github.com/skyedai910/Vuln/tree/master/DIR-820L/command_execution_0 - Exploit, Third Party Advisory () https://github.com/skyedai910/Vuln/tree/master/DIR-820L/command_execution_0 - Broken Link, Exploit, Third Party Advisory
References () https://github.com/zhizhuoshuma/cve_info_data/blob/ccaed4b94ba762eb8a8e003bfa762a7754b8182e/Vuln/Vuln/DIR-820L/command_execution_0/README.md - () https://github.com/zhizhuoshuma/cve_info_data/blob/ccaed4b94ba762eb8a8e003bfa762a7754b8182e/Vuln/Vuln/DIR-820L/command_execution_0/README.md - Exploit, Third Party Advisory
References () https://www.dlink.com/en/security-bulletin/ - Vendor Advisory () https://www.dlink.com/en/security-bulletin/ - Not Applicable, Vendor Advisory

08 Aug 2023, 14:21

Type Values Removed Values Added
CWE NVD-CWE-noinfo CWE-78

26 Apr 2023, 18:55

Type Values Removed Values Added
CPE cpe:2.3:h:d-link:dir-820l:-:*:*:*:*:*:*:* cpe:2.3:h:dlink:dir-820l:-:*:*:*:*:*:*:*

13 Mar 2023, 14:15

Type Values Removed Values Added
Summary D-Link DIR-820L 1.05B03 was discovered to contain a remote command execution (RCE) vulnerability via the Device Name parameter in /lan.asp. D-Link DIR-820L 1.05B03 was discovered to contain remote command execution (RCE) vulnerability via HTTP POST to get set ccp.
References
  • (MISC) https://github.com/zhizhuoshuma/cve_info_data/blob/ccaed4b94ba762eb8a8e003bfa762a7754b8182e/Vuln/Vuln/DIR-820L/command_execution_0/README.md -

04 Apr 2022, 13:08

Type Values Removed Values Added
CWE NVD-CWE-noinfo
References (MISC) https://github.com/skyedai910/Vuln/tree/master/DIR-820L/command_execution_0 - (MISC) https://github.com/skyedai910/Vuln/tree/master/DIR-820L/command_execution_0 - Exploit, Third Party Advisory
References (MISC) http://dlink.com - (MISC) http://dlink.com - Vendor Advisory
References (MISC) http://dir-820l.com - (MISC) http://dir-820l.com - Broken Link
References (MISC) https://www.dlink.com/en/security-bulletin/ - (MISC) https://www.dlink.com/en/security-bulletin/ - Vendor Advisory
CVSS v2 : unknown
v3 : unknown
v2 : 7.5
v3 : 9.8
CPE cpe:2.3:h:d-link:dir-820l:-:*:*:*:*:*:*:*
cpe:2.3:o:dlink:dir-820l_firmware:1.05:b03:*:*:*:*:*:*

28 Mar 2022, 00:15

Type Values Removed Values Added
New CVE

Information

Published : 2022-03-28 00:15

Updated : 2024-06-28 14:04


NVD link : CVE-2022-26258

Mitre link : CVE-2022-26258

CVE.ORG link : CVE-2022-26258


JSON object : View

Products Affected

dlink

  • dir-820l_firmware
  • dir-820l
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')