1.2 KiB
1.2 KiB
CVE-2013-10059
Description
An authenticated OS command injection vulnerability exists in various D-Link routers (tested on DIR-615H1 running firmware version 8.04) via the tools_vct.htm endpoint. The web interface fails to sanitize input passed from the ping_ipaddr parameter to the tools_vct.htm diagnostic interface, allowing attackers to inject arbitrary shell commands using backtick encapsulation. With default credentials, an attacker can exploit this blind injection vector to execute arbitrary commands.
POC
Reference
- https://www.exploit-db.com/exploits/24477
- https://www.exploit-db.com/exploits/25609
- https://www.vulncheck.com/advisories/d-link-legacy-os-command-injection
Github
No PoCs found on GitHub currently.