Overview
- Description
- Remote Code Execution (RCE) vulnerability exists in D-Link Router DIR-846 DIR846A1_FW100A43.bin and DIR846enFW100A53DLA-Retail.bin. Malicious users can use this vulnerability to use "\ " or backticks to bypass the shell metacharacters in the ssid0 or ssid1 parameters to execute arbitrary commands.This vulnerability is due to the fact that CVE-2019-17509 is not fully patched and can be bypassed by using line breaks or backticks on its basis.
- Source
- cve@mitre.org
- NVD status
- Analyzed
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 9.8
- Impact score
- 5.9
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Severity
- CRITICAL
CVSS 2.0
- Type
- Primary
- Base score
- 10
- Impact score
- 10
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- CWE-78
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:dlink:dir-846_firmware:100a43:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3294C98A-8C06-4E84-BB77-5D539360FEFB" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:dlink:dir-846:a1:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "463CF40F-BF42-4440-A62D-F32E162E8852" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:dlink:dir-846_firmware:100a53dla:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "43DB2C54-7976-400B-A2C7-24F986E1303B" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:dlink:dir-846:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "77723994-0E2A-4A90-B2C6-5B262CBBAFA1" } ], "operator": "OR" } ], "operator": "AND" } ]