Impact
The flaw exists in the alphapd component of D‑Link DCS‑933L, where the /setSystemAdmin endpoint accepts an AdminID parameter without proper validation. This omission allows an attacker to inject arbitrary shell commands, resulting in the execution of those commands on the device’s operating system. The vulnerability is a classic command injection, which is reflected in CWE‑74 for improper validation and CWE‑77 for command execution with untrusted input.
Affected Systems
Devices identified as D‑Link DCS‑933L with firmware versions up to and including 1.14.11 are affected. Firmware beyond 1.14.11 and other D‑Link hardware do not contain the vulnerable software path and are therefore not impacted.
Risk and Exploitability
The CVSS v3.1 score is 5.3, indicating a moderate severity. Because the EPSS score is less than 1%, exploitation has not yet become widespread, and the vulnerability is not listed in the CISA Known Exploited Vulnerabilities catalog. Nevertheless, remote attackers who can reach the administrative interface of an unsupported DCS‑933L can potentially inject and run shell commands, compromising confidentiality, integrity, and availability of the device and any connected networks.
OpenCVE Enrichment