Impact
The vulnerability resides in the ssdpcgi_main function of the SSDP component in D-Link DIR-820LW firmware 2.03, allowing a remote attacker to inject operating system commands by manipulating the HTTP_ST environment variable. This command injection can be triggered over the network and gives control to execute arbitrary commands on the router, potentially compromising confidentiality, integrity, and availability of the network.
Affected Systems
All D-Link DIR-820LW routers running firmware version 2.03 are affected. Devices with this firmware deployed on any network present a risk to administrators and users.
Risk and Exploitability
The CVSS score of 6.9 indicates moderate severity, while the EPSS score of 1% suggests a relatively low but measurable likelihood of exploitation. The flaw is not listed in the CISA KEV catalog. Attackers can exploit the exposed SSDP functionality remotely through crafted HTTP requests that set the HTTP_ST environment variable, enabling command injection without prior authentication.
OpenCVE Enrichment