D-Link DIR-1260 GetDeviceSettings Pre-Auth Command Injection Vulnerability












EIP-3b20d7b3


A command injection vulnerability exists within the web management interface of the D-Link DIR-1260 Wi-Fi router that allows for unauthenticated attackers to execute arbitrary commands on the device with root privileges. The flaw specifically exists within the SetDest/Dest/Target arguments to the GetDeviceSettings form. The management interface is accessible over HTTP and HTTPS on the local and Wi-Fi networks and optionally from the Internet.


Vulnerability Identifiers


Exodus Intelligence: EIP-3b20d7b3
MITRE CVE: TBD

Vulnerability Metrics


CVSSv2 Score: 8.3

Vendor References


https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10298

Discovery Credit


Exodus Intelligence

Disclosure Timeline


Disclosed to affected vendor: March 2nd, 2022
Disclosed to public: May 11th, 2022

Further Information


Readers of this advisory who are interested in receiving further details around the vulnerability, mitigations, detection guidance, and more can contact us at [email protected].


Researchers who are interested in monetizing their 0Day and NDay can work with us through our Research Sponsorship Program.












The post D-Link DIR-1260 GetDeviceSettings Pre-Auth Command Injection Vulnerability appeared first on Exodus Intelligence.



Support the originator by clicking the read the rest link below.