Impact
A flaw in the ssdp.cgi component of the D-Link DIR-600 router allows an attacker to alter the HTTP_ST, REMOTE_ADDR, REMOTE_PORT, or SERVER_ID arguments, resulting in command injection that can execute arbitrary commands on the device. This injection is based on improper handling of user-supplied input (see CWE‑74 and CWE‑77). The vulnerability can compromise the confidentiality, integrity, and availability of the affected router and may be leveraged to gain further network access or deploy malware.
Affected Systems
The vulnerability affects the D-Link DIR-600 router model, specifically firmware versions up to 2.15WWb02. Devices running these firmware releases are at risk, and the affected units are no longer supported by the manufacturer.
Risk and Exploitability
The CVSS v3.1 score of 5.1 indicates moderate severity. The EPSS probability of exploitation is less than 1%, and the vulnerability is not listed in the CISA KEV catalog. Attackers can exploit the flaw remotely via HTTP requests without authentication. Once the vulnerability is triggered, an attacker can execute any command defined on the router, potentially taking full control of the device.
OpenCVE Enrichment