CVE-2026-7067
🟡 Monitoruj
Wstrzyknięcie poleceń w D-Link DIR-822 umożliwia zdalne wykonanie kodu.
CVSS
7.3
EPSS
0.9%
Exploit
poc
Vendor
dlink
Opis źródłowy (NVD)
A vulnerability was determined in D-Link DIR-822 A_101. The impacted element is the function system of the file /udhcpcd/dhcpd.c of the component udhcpd DHCP Service. This manipulation of the argument Hostname causes command injection. The attack can be initiated remotely. The exploit has been publicly disclosed and may be utilized. This vulnerability only affects products that are no longer supported by the maintainer.
exploit rce
Brak patcha
Źródła i daty
| Źródło | Wartość |
|---|---|
| NVD – CVSS | 7.3 |
| CISA KEV (aktywnie wykorzystywane) | Nie |
| FIRST EPSS (prawdopodobieństwo exploita) | 0.9% |
| Opublikowano (NVD) | 2026-04-27 00:16:20 UTC |
| Ostatnia modyfikacja (NVD) | 2026-04-30 14:09:13 UTC |
Referencje
- https://tzh00203.notion.site/D-Link-DIR-822-A1-Command-Injection-in-udhcpd-via-DHCP-Hostname-337b5c52018a80d9b638d0fa59969e6b (cna@vuldb.com) [Exploit, Third Party Advisory]
- https://vuldb.com/submit/798645 (cna@vuldb.com) [Third Party Advisory, VDB Entry]
- https://vuldb.com/vuln/359642 (cna@vuldb.com) [Third Party Advisory, VDB Entry]
- https://vuldb.com/vuln/359642/cti (cna@vuldb.com) [Permissions Required, VDB Entry]
- https://www.dlink.com/ (cna@vuldb.com) [Product]