ID

VAR-202401-1079


CVE

CVE-2024-0921


TITLE

D-Link Systems, Inc.  of  DIR-816 A2  in the firmware  OS  Command injection vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2024-001997

DESCRIPTION

A vulnerability has been found in D-Link DIR-816 A2 1.10CNB04 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /goform/setDeviceSettings of the component Web Interface. The manipulation of the argument statuscheckpppoeuser leads to os command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-252139. D-Link Systems, Inc. of DIR-816 A2 The firmware has OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. D-Link DIR-816 A2 is a wireless router made by China D-Link Company. This vulnerability is caused by the failure of the parameter statuscheckpppoeuser to correctly filter special characters, commands, etc. in the constructed command. An attacker could exploit this vulnerability to cause arbitrary command execution

Trust: 2.16

sources: NVD: CVE-2024-0921 // JVNDB: JVNDB-2024-001997 // CNVD: CNVD-2024-09305

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2024-09305

AFFECTED PRODUCTS

vendor:dlinkmodel:dir-816 a2scope:eqversion:1.10cnb04

Trust: 1.0

vendor:d linkmodel:dir-816 a2scope:eqversion:dir-816 a2 firmware 1.10cnb04

Trust: 0.8

vendor:d linkmodel:dir-816 a2scope:eqversion: -

Trust: 0.8

vendor:d linkmodel:dir-816 a2scope: - version: -

Trust: 0.8

vendor:d linkmodel:dir-816 a2 1.10cnb04scope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2024-09305 // JVNDB: JVNDB-2024-001997 // NVD: CVE-2024-0921

CVSS

SEVERITY

CVSSV2

CVSSV3

cna@vuldb.com: CVE-2024-0921
value: MEDIUM

Trust: 1.0

nvd@nist.gov: CVE-2024-0921
value: CRITICAL

Trust: 1.0

NVD: CVE-2024-0921
value: CRITICAL

Trust: 0.8

CNVD: CNVD-2024-09305
value: MEDIUM

Trust: 0.6

cna@vuldb.com: CVE-2024-0921
severity: MEDIUM
baseScore: 5.8
vectorString: AV:N/AC:L/AU:M/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: MULTIPLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 6.4
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

CNVD: CNVD-2024-09305
severity: MEDIUM
baseScore: 6.5
vectorString: AV:N/AC:L/AU:S/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

cna@vuldb.com: CVE-2024-0921
baseSeverity: MEDIUM
baseScore: 4.7
vectorString: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: LOW
exploitabilityScore: 1.2
impactScore: 3.4
version: 3.1

Trust: 1.0

nvd@nist.gov: CVE-2024-0921
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: CVE-2024-0921
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2024-09305 // JVNDB: JVNDB-2024-001997 // NVD: CVE-2024-0921 // NVD: CVE-2024-0921

PROBLEMTYPE DATA

problemtype:CWE-78

Trust: 1.0

problemtype:OS Command injection (CWE-78) [ others ]

Trust: 0.8

sources: JVNDB: JVNDB-2024-001997 // NVD: CVE-2024-0921

EXTERNAL IDS

db:NVDid:CVE-2024-0921

Trust: 3.2

db:VULDBid:252139

Trust: 1.8

db:JVNDBid:JVNDB-2024-001997

Trust: 0.8

db:CNVDid:CNVD-2024-09305

Trust: 0.6

sources: CNVD: CNVD-2024-09305 // JVNDB: JVNDB-2024-001997 // NVD: CVE-2024-0921

REFERENCES

url:https://github.com/xiyuanhuaigu/cve/blob/main/rce.md

Trust: 1.8

url:https://vuldb.com/?id.252139

Trust: 1.8

url:https://nvd.nist.gov/vuln/detail/cve-2024-0921

Trust: 1.4

url:https://vuldb.com/?ctiid.252139

Trust: 1.0

sources: CNVD: CNVD-2024-09305 // JVNDB: JVNDB-2024-001997 // NVD: CVE-2024-0921

SOURCES

db:CNVDid:CNVD-2024-09305
db:JVNDBid:JVNDB-2024-001997
db:NVDid:CVE-2024-0921

LAST UPDATE DATE

2024-08-14T14:09:36.462000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2024-09305date:2024-02-21T00:00:00
db:JVNDBid:JVNDB-2024-001997date:2024-02-07T04:37:00
db:NVDid:CVE-2024-0921date:2024-05-17T02:35:03.260

SOURCES RELEASE DATE

db:CNVDid:CNVD-2024-09305date:2024-02-08T00:00:00
db:JVNDBid:JVNDB-2024-001997date:2024-02-07T00:00:00
db:NVDid:CVE-2024-0921date:2024-01-26T14:15:50.237