CVE-2022-46552
Gravedad CVSS v3.1:
ALTA
Tipo:
CWE-78
Neutralización incorrecta de elementos especiales usados en un comando de sistema operativo (Inyección de comando de sistema operativo)
Fecha de publicación:
02/02/2023
Última modificación:
27/03/2025
Descripción
*** Pendiente de traducción *** D-Link DIR-846 Firmware FW100A53DBR was discovered to contain a remote command execution (RCE) vulnerability via the lan(0)_dhcps_staticlist parameter. This vulnerability is exploited via a crafted POST request.
Impacto
Puntuación base 3.x
8.80
Gravedad 3.x
ALTA
Productos y versiones vulnerables
CPE | Desde | Hasta |
---|---|---|
cpe:2.3:o:dlink:dir-846_firmware:100a53dbr:*:*:*:*:*:*:* | ||
cpe:2.3:h:dlink:dir-846:-:*:*:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- http://packetstormsecurity.com/files/171710/D-Link-DIR-846-Remote-Command-Execution.html
- https://cwe.mitre.org/data/definitions/78.html
- https://francoataffarel.medium.com/cve-2022-46552-d-link-dir-846-wireless-router-in-firmware-fw100a53dbr-retail-has-a-vulnerability-5b4ca1864c6e
- https://github.com/FloeDesignTechnologies/phpcs-security-audit/blob/master/Security/Sniffs/BadFunctions/SystemExecFunctionsSniff.php
- https://github.com/c2dc/cve-reported/blob/main/CVE-2022-46552/CVE-2022-46552.md
- https://www.dlink.com/en/security-bulletin/
- https://www.php.net/manual/en/ref.exec.php
- http://packetstormsecurity.com/files/171710/D-Link-DIR-846-Remote-Command-Execution.html
- https://cwe.mitre.org/data/definitions/78.html
- https://francoataffarel.medium.com/cve-2022-46552-d-link-dir-846-wireless-router-in-firmware-fw100a53dbr-retail-has-a-vulnerability-5b4ca1864c6e
- https://github.com/FloeDesignTechnologies/phpcs-security-audit/blob/master/Security/Sniffs/BadFunctions/SystemExecFunctionsSniff.php
- https://github.com/c2dc/cve-reported/blob/main/CVE-2022-46552/CVE-2022-46552.md
- https://www.dlink.com/en/security-bulletin/
- https://www.php.net/manual/en/ref.exec.php