Impact
A command injection vulnerability exists in the D-Link DCS700l 1.03.09 firmware within the Web Form Handler’s /setDayNightMode endpoint. By manipulating the LightSensorControl argument, an attacker can inject arbitrary system commands, potentially leading to remote code execution and compromise of device integrity. The weakness is classified as command injection (CWE-74 and CWE-77).
Affected Systems
The vulnerability affects D-Link DCS700l routers running firmware version 1.03.09. No additional products or versions are listed as impacted.
Risk and Exploitability
The CVSS score of 5.1 indicates moderate severity, and the EPSS score of less than 1% suggests a low probability of widespread exploitation. The flaw is not listed in the CISA KEV catalog, but a publicly available exploit has been reported. The attack vector is remote; an attacker can send a crafted HTTP request to the exposed /setDayNightMode endpoint, inserting malicious commands via the LightSensorControl parameter. Devices exposed directly to the internet or lacking proper network segmentation face the highest risk. Maintaining up‑to‑date firmware and restricting access can mitigate these risks.
OpenCVE Enrichment