Impact
A remote attacker can manipulate the IPAddress parameter in the HNAP1 SetNetworkSettings Handler of a D-Link DIR‑882 router to inject operating system commands via a vulnerable sprintf call. This leads to arbitrary code execution on the device, allowing full control and potential compromise of the network.
Affected Systems
The vulnerability affects D-Link DIR‑882 routers running firmware version 1.01B02, which is no longer supported by the manufacturer.
Risk and Exploitability
With a CVSS score of 8.6 the issue is considered high severity. No EPSS score is available, and the vulnerability is not listed in the CISA KEV catalog. The exploit is publicly known and can be triggered without authentication from any remote host. Due to the lack of active support, users are at significant risk if the device remains exposed.
OpenCVE Enrichment