D-link DIR-816 A2 v1.10 is affected by a remote code injection vulnerability. An HTTP request parameter can be used in command string construction in the handler function of the /goform/dir_setWanWifi, which can lead to command injection via shell metacharacters in the statuscheckpppoeuser parameter.
Metrics
Affected Vendors & Products
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-03T20:33:40.791Z
Reserved: 2021-02-05T00:00:00
Link: CVE-2021-26810
No data.
Status : Modified
Published: 2021-03-30T14:15:13.607
Modified: 2024-11-21T05:56:51.033
Link: CVE-2021-26810
No data.
OpenCVE Enrichment
No data.
Weaknesses