Impact
A vulnerability exists in D‑Link DCS‑931L firmware up to version 1.13.0, where an attacker can manipulate the AdminID parameter of the /setSystemAdmin endpoint, triggering arbitrary operating‑system command execution. The flaw is a classic command injection (CWE‑74, CWE‑77). Exploitation can give the attacker control over the device, including full firmware‑level privileges.
Affected Systems
The affected product is the D‑Link DCS‑931L network video recorder, running firmware 1.13.0 or earlier. Firmware is no longer supported, so no official fix is available from the vendor.
Risk and Exploitability
The exploit can be launched remotely without authentication. Although the CVSS score is 5.1, indicating moderate severity, the lack of a public patch and the public availability of proof‑of‑concept code increase the risk of real‑world attacks. The EPSS score is below 1 % and the vulnerability is not in CISA KEV, but the low defense is the lack of vendor assistance, making mitigation the primary defense.
OpenCVE Enrichment