Impact
The vulnerability resides in the D-Link DWR-M921 firmware 1.1.50 within the USSD Configuration Endpoint, specifically in the function sub_419F20 of the /boafrm/formUSSDSetup component. By manipulating the ussdValue argument, an attacker can inject arbitrary operating system commands, enabling full remote code execution on the device. The flaw is identified as a command injection (CWE‑74) and OS command injection (CWE‑77) weakness.
Affected Systems
This issue affects all D-Link DWR-M921 routers running firmware version 1.1.50. The vulnerable component is the USSD Configuration Endpoint exposed by the router, which may be accessed remotely.
Risk and Exploitability
This vulnerability has a CVSS score of 8.6, indicating high severity. It can be exploited remotely, although its EPSS score is less than 1%, pointing to a low likelihood of widespread exploitation at present. The flaw permits execution of arbitrary commands via the USSD configuration endpoint, which could compromise the device and allow further movement within the network.
OpenCVE Enrichment