Vulnerabilites related to dlink - dir-2640
Vulnerability from fkie_nvd
Published
2022-04-11 20:15
Modified
2024-11-21 06:40
Severity ?
Summary
A command injection vulnerability in the protest binary allows an attacker with access to the remote command line interface to execute arbitrary commands as root.
References
▼ | URL | Tags | |
---|---|---|---|
vulnreport@tenable.com | https://www.tenable.com/security/research/tra-2022-09 | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.tenable.com/security/research/tra-2022-09 | Exploit, Third Party Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dlink:dir-1360_firmware:1.02b03:*:*:*:*:*:*:*", "matchCriteriaId": "CF007E45-F1D5-4B86-8C32-4522BB78B113", "vulnerable": true }, { "criteria": "cpe:2.3:o:dlink:dir-1360_firmware:1.03b02:*:*:*:*:*:*:*", "matchCriteriaId": "9EE0B84B-984C-405B-AD53-89F048F48721", "vulnerable": true }, { "criteria": "cpe:2.3:o:dlink:dir-1360_firmware:1.11b04:*:*:*:*:*:*:*", "matchCriteriaId": "E091E879-E4C2-4782-9E47-C712A7947727", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dlink:dir-1360:a1:*:*:*:*:*:*:*", "matchCriteriaId": "C8E7C9EC-241F-4698-9878-DC02CB1B69E2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dlink:dir-1760_firmware:1.01b04:*:*:*:*:*:*:*", "matchCriteriaId": "CA7235AB-E767-4772-99F4-2CC3046564EC", "vulnerable": true }, { "criteria": "cpe:2.3:o:dlink:dir-1760_firmware:1.11b03:beta:*:*:*:*:*:*", "matchCriteriaId": "D6FEFE51-389C-478A-B2D5-AAF2066649C4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dlink:dir-1760:-:*:*:*:*:*:*:*", "matchCriteriaId": "5C961D12-61B7-440A-B7CE-C431E6903CDC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dlink:dir-1960_firmware:1.02b01:*:*:*:*:*:*:*", "matchCriteriaId": "94032F8E-AB47-451C-B5C2-21724ABB43DE", "vulnerable": true }, { "criteria": "cpe:2.3:o:dlink:dir-1960_firmware:1.03b03:*:*:*:*:*:*:*", "matchCriteriaId": "4292CE32-F5C9-4714-AE2E-577C304EA441", "vulnerable": true }, { "criteria": "cpe:2.3:o:dlink:dir-1960_firmware:1.11b03:*:*:*:*:*:*:*", "matchCriteriaId": "490294F3-F68E-43A4-8570-A4BDF233BEED", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dlink:dir-1960:a1:*:*:*:*:*:*:*", "matchCriteriaId": "144284ED-C086-49DE-8516-844A6CD2A30C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dlink:dir-2640_firmware:1.11b02:beta:*:*:*:*:*:*", "matchCriteriaId": "9141FC19-E6B2-4BA3-9166-A173BF772A6E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dlink:dir-2640:-:*:*:*:*:*:*:*", "matchCriteriaId": "D68A4D09-6C9A-4F3B-863D-DF612DB8DB89", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dlink:dir-2660_firmware:1.04b03:*:*:*:*:*:*:*", "matchCriteriaId": "03EB40C9-7AA1-4850-8856-A10D0A4759D2", "vulnerable": true }, { "criteria": "cpe:2.3:o:dlink:dir-2660_firmware:1.11b04:*:*:*:*:*:*:*", "matchCriteriaId": "F695ADF7-0327-4983-A4E2-174C15674B37", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dlink:dir-2660:a1:*:*:*:*:*:*:*", "matchCriteriaId": "D043D251-10DA-4939-BEBA-284A4A956B0D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dlink:dir-3040_firmware:1.13b03:beta:*:*:*:*:*:*", "matchCriteriaId": "22A3B1DF-2D8E-4709-A7FA-8EAD016DA9F6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dlink:dir-3040:-:*:*:*:*:*:*:*", "matchCriteriaId": "A4EDA686-7BB6-49CB-8370-E0E5F53914A8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dlink:dir-3060_firmware:1.00b12:*:*:*:*:*:*:*", "matchCriteriaId": "335C34AB-4223-4D81-B664-C0E730B0BFBA", "vulnerable": true }, { "criteria": "cpe:2.3:o:dlink:dir-3060_firmware:1.11b04:beta:*:*:*:*:*:*", "matchCriteriaId": "BE1DF67D-9464-4FEA-A5F6-BD5AC47D4E2F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dlink:dir-3060:-:*:*:*:*:*:*:*", "matchCriteriaId": "1B48DF58-000E-4846-BEB6-69E4E69375E7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dlink:dir-867_firmware:1.20b10:*:*:*:*:*:*:*", "matchCriteriaId": "12D2E414-7BC6-432D-897B-35FFAE944374", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dlink:dir-867:a1:*:*:*:*:*:*:*", "matchCriteriaId": "9747CBE7-1ECC-403F-93FC-0BBBE0124111", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dlink:dir-878_firmware:1.20b05:*:*:*:*:*:*:*", "matchCriteriaId": "D1CD2BE2-2157-4ADA-986F-2033EF15BC56", "vulnerable": true }, { "criteria": "cpe:2.3:o:dlink:dir-878_firmware:1.30b08:*:*:*:*:*:*:*", "matchCriteriaId": "7BFB6A28-3330-449A-A738-C2AC52B04C6B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dlink:dir-878:-:*:*:*:*:*:*:*", "matchCriteriaId": "9D288C73-F89A-47FF-AF11-143C3DFDF942", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dlink:dir-882_firmware:1.20b06:*:*:*:*:*:*:*", "matchCriteriaId": "DEBD8322-35F5-40FC-B8F7-1C74AD9C6259", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dlink:dir-882:-:*:*:*:*:*:*:*", "matchCriteriaId": "F6ECB8ED-F3A2-4C05-8570-719ECB166B09", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dlink:dir-1360_firmware:1.00b15:*:*:*:*:*:*:*", "matchCriteriaId": "CD10B74D-AE8C-40EC-99E5-2298A3085840", "vulnerable": true }, { "criteria": "cpe:2.3:o:dlink:dir-1360_firmware:1.01b03:*:*:*:*:*:*:*", "matchCriteriaId": "7C7BF035-A533-4F38-9E4F-04A83D648B20", "vulnerable": true }, { "criteria": "cpe:2.3:o:dlink:dir-1360_firmware:1.11b04:beta:*:*:*:*:*:*", "matchCriteriaId": "37851FB0-40E6-4BA7-9A9C-E127851E4032", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dlink:dir-1360:-:*:*:*:*:*:*:*", "matchCriteriaId": "CD91DDBE-83E8-4F3A-BB71-1EC8798DD086", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dlink:dir-1960_firmware:1.11b03:beta:*:*:*:*:*:*", "matchCriteriaId": "97E30469-D830-457F-B1FD-7BA3DA8B49E3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dlink:dir-1960:-:*:*:*:*:*:*:*", "matchCriteriaId": "67D40051-D7D8-4C76-B006-A94D501647C6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dlink:dir-2640_firmware:1.01b04:*:*:*:*:*:*:*", "matchCriteriaId": "114D694E-3858-4FCA-BE67-65C78256C0FF", "vulnerable": true }, { "criteria": "cpe:2.3:o:dlink:dir-2640_firmware:1.11b02:*:*:*:*:*:*:*", "matchCriteriaId": "AC690F1B-7B27-42A1-853A-EF04959FCF07", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dlink:dir-2640:a1:*:*:*:*:*:*:*", "matchCriteriaId": "F950267C-AA12-4B1B-9995-66CDB0512757", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dlink:dir-2660_firmware:1.00b14:*:*:*:*:*:*:*", "matchCriteriaId": "50F1ACBB-BE31-4912-862D-05866A0AD7C5", "vulnerable": true }, { "criteria": "cpe:2.3:o:dlink:dir-2660_firmware:1.01b03:*:*:*:*:*:*:*", "matchCriteriaId": "900238FF-5D28-4EF3-B8D2-92D9525EAF62", "vulnerable": true }, { "criteria": "cpe:2.3:o:dlink:dir-2660_firmware:1.02b01:*:*:*:*:*:*:*", "matchCriteriaId": "2BAB44B3-A735-4BAA-89E4-11EAB2E62EBF", "vulnerable": true }, { "criteria": "cpe:2.3:o:dlink:dir-2660_firmware:1.03b04:*:*:*:*:*:*:*", "matchCriteriaId": "2C4EF06F-6619-4523-977A-0A3780D65C08", "vulnerable": true }, { "criteria": "cpe:2.3:o:dlink:dir-2660_firmware:1.11b04:beta:*:*:*:*:*:*", "matchCriteriaId": "4B621EA3-5396-4E84-A2FA-0DB68CEE4583", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dlink:dir-2660:-:*:*:*:*:*:*:*", "matchCriteriaId": "37C4E9FB-B4B0-40A8-A0B0-398050F9180D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dlink:dir-3040_firmware:1.11b02:*:*:*:*:*:*:*", "matchCriteriaId": "536F60AF-6A0B-419A-B2EC-E13D6D7FC398", "vulnerable": true }, { "criteria": "cpe:2.3:o:dlink:dir-3040_firmware:1.12b01:*:*:*:*:*:*:*", "matchCriteriaId": "F5681FB5-5F16-439F-B40E-A5FBBF15DEE5", "vulnerable": true }, { "criteria": "cpe:2.3:o:dlink:dir-3040_firmware:1.13b03:*:*:*:*:*:*:*", "matchCriteriaId": "8495556A-FE73-4D22-A3F1-367D0D143DBD", "vulnerable": true }, { "criteria": "cpe:2.3:o:dlink:dir-3040_firmware:1.20b03:*:*:*:*:*:*:*", "matchCriteriaId": "8E2AA7D0-1625-4493-8E18-3B9362466C9B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dlink:dir-3040:a1:*:*:*:*:*:*:*", "matchCriteriaId": "05ACD014-D3EE-4653-91F9-959FB7BD0BC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dlink:dir-3060_firmware:1.01b07:*:*:*:*:*:*:*", "matchCriteriaId": "26AA9A9D-4690-47C4-AB35-36FF8CD1E887", "vulnerable": true }, { "criteria": "cpe:2.3:o:dlink:dir-3060_firmware:1.02b03:*:*:*:*:*:*:*", "matchCriteriaId": "3B39D8AC-04D7-40AF-A72D-5ADD5CACA57A", "vulnerable": true }, { "criteria": "cpe:2.3:o:dlink:dir-3060_firmware:1.11b02:*:*:*:*:*:*:*", "matchCriteriaId": "16BC242D-9BBA-4A67-BCBD-A61CEBC87175", "vulnerable": true }, { "criteria": "cpe:2.3:o:dlink:dir-3060_firmware:1.11b04:*:*:*:*:*:*:*", "matchCriteriaId": "8C423CCB-73CC-4AE7-B163-F2A0CB4D8817", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dlink:dir-3060:a1:*:*:*:*:*:*:*", "matchCriteriaId": "75CB7C7C-1B0E-4EC8-9FFC-363D2DF1CDBD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dlink:dir-867_firmware:1.10b04:*:*:*:*:*:*:*", "matchCriteriaId": "2C531C05-7DE4-496D-B70B-8EEF56579BF9", "vulnerable": true }, { "criteria": "cpe:2.3:o:dlink:dir-867_firmware:1.30b07:*:*:*:*:*:*:*", "matchCriteriaId": "06D97D1B-02AC-46A2-AABC-6336B606C131", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dlink:dir-867:-:*:*:*:*:*:*:*", "matchCriteriaId": "94CB6320-D2FB-4405-8C2D-BB59798A0670", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:dlink:dir-882_firmware:1.30b06:*:*:*:*:*:*:*", "matchCriteriaId": "ECEECA9D-716E-4C4D-A299-F3BA3D0C790B", "vulnerable": true }, { "criteria": "cpe:2.3:o:dlink:dir-882_firmware:1.30b10:*:*:*:*:*:*:*", "matchCriteriaId": "E29C868C-B1AD-4C46-99C4-94EEE89CF02A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:dlink:dir-882:a1:*:*:*:*:*:*:*", "matchCriteriaId": "90575122-CE47-42E5-BCE3-6444599B16B3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A command injection vulnerability in the protest binary allows an attacker with access to the remote command line interface to execute arbitrary commands as root." }, { "lang": "es", "value": "Una vulnerabilidad de inyecci\u00f3n de comandos en el binario de protesta permite a un atacante con acceso a la interfaz de l\u00ednea de comandos remota ejecutar comandos arbitrarios como root" } ], "id": "CVE-2022-1262", "lastModified": "2024-11-21T06:40:21.910", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-04-11T20:15:18.157", "references": [ { "source": "vulnreport@tenable.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://www.tenable.com/security/research/tra-2022-09" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://www.tenable.com/security/research/tra-2022-09" } ], "sourceIdentifier": "vulnreport@tenable.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-78" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
cve-2022-1262
Vulnerability from cvelistv5
Published
2022-04-11 19:38
Modified
2024-08-02 23:55
Severity ?
EPSS score ?
Summary
A command injection vulnerability in the protest binary allows an attacker with access to the remote command line interface to execute arbitrary commands as root.
References
▼ | URL | Tags |
---|---|---|
https://www.tenable.com/security/research/tra-2022-09 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | D-Link Routers |
Version: DIR-1360 A1 firmware version 1.02B03, DIR-1360 A1 firmware version 1.03B02, DIR-1360 A1 firmware version 1.11B04, DIR-1360 firmware version 1.00B15, DIR-1360 firmware version 1.01B03, DIR-1760 firmware version 1.01B04, DIR-1960 A1 firmware version 1.02B01, DIR-1960 A1 firmware version 1.03B03, DIR-1960 A1 firmware version 1.11B03, DIR-2640 A1 firmware version 1.01B04, DIR-2640 A1 firmware version 1.11B02, DIR-2660 A1 firmware version 1.04B03, DIR-2660 A1 firmware version 1.11B04, DIR-2660 firmware version 1.00B14, DIR-2660 firmware version 1.01B03, DIR-2660 firmware version 1.02B01, DIR-2660 firmware version 1.03B04, DIR-3040 A1 firmware version 1.11B02, DIR-3040 A1 firmware version 1.12B01, DIR-3040 A1 firmware version 1.13B03, DIR-3040 A1 firmware version 1.20B03, DIR-3060 A1 firmware version 1.01B07, DIR-3060 A1 firmware version 1.02B03, DIR-3060 A1 firmware version 1.11B04, DIR-3060 firmware version 1.00B12, DIR-867 A1 firmware version 1.20B10, DIR-867 firmware version 1.10B04, DIR-867 fir ...[truncated*] |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T23:55:24.531Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.tenable.com/security/research/tra-2022-09" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "D-Link Routers", "vendor": "n/a", "versions": [ { "status": "affected", "version": "DIR-1360 A1 firmware version 1.02B03, DIR-1360 A1 firmware version 1.03B02, DIR-1360 A1 firmware version 1.11B04, DIR-1360 firmware version 1.00B15, DIR-1360 firmware version 1.01B03, DIR-1760 firmware version 1.01B04, DIR-1960 A1 firmware version 1.02B01, DIR-1960 A1 firmware version 1.03B03, DIR-1960 A1 firmware version 1.11B03, DIR-2640 A1 firmware version 1.01B04, DIR-2640 A1 firmware version 1.11B02, DIR-2660 A1 firmware version 1.04B03, DIR-2660 A1 firmware version 1.11B04, DIR-2660 firmware version 1.00B14, DIR-2660 firmware version 1.01B03, DIR-2660 firmware version 1.02B01, DIR-2660 firmware version 1.03B04, DIR-3040 A1 firmware version 1.11B02, DIR-3040 A1 firmware version 1.12B01, DIR-3040 A1 firmware version 1.13B03, DIR-3040 A1 firmware version 1.20B03, DIR-3060 A1 firmware version 1.01B07, DIR-3060 A1 firmware version 1.02B03, DIR-3060 A1 firmware version 1.11B04, DIR-3060 firmware version 1.00B12, DIR-867 A1 firmware version 1.20B10, DIR-867 firmware version 1.10B04, DIR-867 fir ...[truncated*]" } ] } ], "descriptions": [ { "lang": "en", "value": "A command injection vulnerability in the protest binary allows an attacker with access to the remote command line interface to execute arbitrary commands as root." } ], "problemTypes": [ { "descriptions": [ { "description": "Command Injection", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-11T19:38:13", "orgId": "5ac1ecc2-367a-4d16-a0b2-35d495ddd0be", "shortName": "tenable" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.tenable.com/security/research/tra-2022-09" } ], "x_ConverterErrors": { "version_name": { "error": "version_name too long. Use array of versions to record more than one version.", "message": "Truncated!" } }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "vulnreport@tenable.com", "ID": "CVE-2022-1262", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "D-Link Routers", "version": { "version_data": [ { "version_value": "DIR-1360 A1 firmware version 1.02B03, DIR-1360 A1 firmware version 1.03B02, DIR-1360 A1 firmware version 1.11B04, DIR-1360 firmware version 1.00B15, DIR-1360 firmware version 1.01B03, DIR-1760 firmware version 1.01B04, DIR-1960 A1 firmware version 1.02B01, DIR-1960 A1 firmware version 1.03B03, DIR-1960 A1 firmware version 1.11B03, DIR-2640 A1 firmware version 1.01B04, DIR-2640 A1 firmware version 1.11B02, DIR-2660 A1 firmware version 1.04B03, DIR-2660 A1 firmware version 1.11B04, DIR-2660 firmware version 1.00B14, DIR-2660 firmware version 1.01B03, DIR-2660 firmware version 1.02B01, DIR-2660 firmware version 1.03B04, DIR-3040 A1 firmware version 1.11B02, DIR-3040 A1 firmware version 1.12B01, DIR-3040 A1 firmware version 1.13B03, DIR-3040 A1 firmware version 1.20B03, DIR-3060 A1 firmware version 1.01B07, DIR-3060 A1 firmware version 1.02B03, DIR-3060 A1 firmware version 1.11B04, DIR-3060 firmware version 1.00B12, DIR-867 A1 firmware version 1.20B10, DIR-867 firmware version 1.10B04, DIR-867 firmware version 1.30B07, DIR-878 firmware version 1.20B05, DIR-878 firmware version 1.30B08, DIR-882 A1 firmware version 1.30B06, DIR-882 A1 firmware version 1.30B10, DIR-882 firmware version 1.20B06" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A command injection vulnerability in the protest binary allows an attacker with access to the remote command line interface to execute arbitrary commands as root." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Command Injection" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.tenable.com/security/research/tra-2022-09", "refsource": "MISC", "url": "https://www.tenable.com/security/research/tra-2022-09" } ] } } } }, "cveMetadata": { "assignerOrgId": "5ac1ecc2-367a-4d16-a0b2-35d495ddd0be", "assignerShortName": "tenable", "cveId": "CVE-2022-1262", "datePublished": "2022-04-11T19:38:13", "dateReserved": "2022-04-06T00:00:00", "dateUpdated": "2024-08-02T23:55:24.531Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
var-202204-0705
Vulnerability from variot
A command injection vulnerability in the protest binary allows an attacker with access to the remote command line interface to execute arbitrary commands as root. dir-1360 firmware, dir-1760 firmware, dir-1960 For multiple D-Link Japan Co., Ltd. products such as firmware, OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202204-0705", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "dir-867", "scope": "eq", "trust": 1.0, "vendor": "dlink", "version": "1.10b04" }, { "model": "dir-1960", "scope": "eq", "trust": 1.0, "vendor": "dlink", "version": "1.03b03" }, { "model": "dir-1360", "scope": "eq", "trust": 1.0, "vendor": "dlink", "version": "1.00b15" }, { "model": "dir-3040", "scope": "eq", "trust": 1.0, "vendor": "dlink", "version": "1.11b02" }, { "model": "dir-2660", "scope": "eq", "trust": 1.0, "vendor": "dlink", "version": "1.02b01" }, { "model": "dir-3060", "scope": "eq", "trust": 1.0, "vendor": "dlink", "version": "1.02b03" }, { "model": "dir-882", "scope": "eq", "trust": 1.0, "vendor": "dlink", "version": "1.30b06" }, { "model": "dir-882", "scope": "eq", "trust": 1.0, "vendor": "dlink", "version": "1.30b10" }, { "model": "dir-2660", "scope": "eq", "trust": 1.0, "vendor": "dlink", "version": "1.03b04" }, { "model": "dir-3040", "scope": "eq", "trust": 1.0, "vendor": "dlink", "version": "1.20b03" }, { "model": "dir-2640", "scope": "eq", "trust": 1.0, "vendor": "dlink", "version": "1.11b02" }, { "model": "dir-1360", "scope": "eq", "trust": 1.0, "vendor": "dlink", "version": "1.03b02" }, { "model": "dir-3060", "scope": "eq", "trust": 1.0, "vendor": "dlink", "version": "1.11b02" }, { "model": "dir-878", "scope": "eq", "trust": 1.0, "vendor": "dlink", "version": "1.30b08" }, { "model": "dir-3040", "scope": "eq", "trust": 1.0, "vendor": "dlink", "version": "1.13b03" }, { "model": "dir-1760", "scope": "eq", "trust": 1.0, "vendor": "dlink", "version": "1.01b04" }, { "model": "dir-2660", "scope": "eq", "trust": 1.0, "vendor": "dlink", "version": "1.00b14" }, { "model": "dir-867", "scope": "eq", "trust": 1.0, "vendor": "dlink", "version": "1.30b07" }, { "model": "dir-1960", "scope": "eq", "trust": 1.0, "vendor": "dlink", "version": "1.02b01" }, { "model": "dir-2660", "scope": "eq", "trust": 1.0, "vendor": "dlink", "version": "1.01b03" }, { "model": "dir-3060", "scope": "eq", "trust": 1.0, "vendor": "dlink", "version": "1.00b12" }, { "model": "dir-1360", "scope": "eq", "trust": 1.0, "vendor": "dlink", "version": "1.01b03" }, { "model": "dir-1360", "scope": "eq", "trust": 1.0, "vendor": "dlink", "version": "1.11b04" }, { "model": "dir-2660", "scope": "eq", "trust": 1.0, "vendor": "dlink", "version": "1.11b04" }, { "model": "dir-1960", "scope": "eq", "trust": 1.0, "vendor": "dlink", "version": "1.11b03" }, { "model": "dir-2660", "scope": "eq", "trust": 1.0, "vendor": "dlink", "version": "1.04b03" }, { "model": "dir-2640", "scope": "eq", "trust": 1.0, "vendor": "dlink", "version": "1.01b04" }, { "model": "dir-1760", "scope": "eq", "trust": 1.0, "vendor": "dlink", "version": "1.11b03" }, { "model": "dir-3060", "scope": "eq", "trust": 1.0, "vendor": "dlink", "version": "1.11b04" }, { "model": "dir-3040", "scope": "eq", "trust": 1.0, "vendor": "dlink", "version": "1.12b01" }, { "model": "dir-882", "scope": "eq", "trust": 1.0, "vendor": "dlink", "version": "1.20b06" }, { "model": "dir-1360", "scope": "eq", "trust": 1.0, "vendor": "dlink", "version": "1.02b03" }, { "model": "dir-3060", "scope": "eq", "trust": 1.0, "vendor": "dlink", "version": "1.01b07" }, { "model": "dir-867", "scope": "eq", "trust": 1.0, "vendor": "dlink", "version": "1.20b10" }, { "model": "dir-878", "scope": "eq", "trust": 1.0, "vendor": "dlink", "version": "1.20b05" }, { "model": "dir-882", "scope": null, "trust": 0.8, "vendor": "\u30c7\u30a3\u30fc\u30ea\u30f3\u30af\u30b8\u30e3\u30d1\u30f3\u682a\u5f0f\u4f1a\u793e", "version": null }, { "model": "dir-3040", "scope": null, "trust": 0.8, "vendor": "\u30c7\u30a3\u30fc\u30ea\u30f3\u30af\u30b8\u30e3\u30d1\u30f3\u682a\u5f0f\u4f1a\u793e", "version": null }, { "model": "dir-3060", "scope": null, "trust": 0.8, "vendor": "\u30c7\u30a3\u30fc\u30ea\u30f3\u30af\u30b8\u30e3\u30d1\u30f3\u682a\u5f0f\u4f1a\u793e", "version": null }, { "model": "dir-1760", "scope": null, "trust": 0.8, "vendor": "\u30c7\u30a3\u30fc\u30ea\u30f3\u30af\u30b8\u30e3\u30d1\u30f3\u682a\u5f0f\u4f1a\u793e", "version": null }, { "model": "dir-878", "scope": null, "trust": 0.8, "vendor": "\u30c7\u30a3\u30fc\u30ea\u30f3\u30af\u30b8\u30e3\u30d1\u30f3\u682a\u5f0f\u4f1a\u793e", "version": null }, { "model": "dir-2660", "scope": null, "trust": 0.8, "vendor": "\u30c7\u30a3\u30fc\u30ea\u30f3\u30af\u30b8\u30e3\u30d1\u30f3\u682a\u5f0f\u4f1a\u793e", "version": null }, { "model": "dir-1360", "scope": null, "trust": 0.8, "vendor": "\u30c7\u30a3\u30fc\u30ea\u30f3\u30af\u30b8\u30e3\u30d1\u30f3\u682a\u5f0f\u4f1a\u793e", "version": null }, { "model": "dir-1960", "scope": null, "trust": 0.8, "vendor": "\u30c7\u30a3\u30fc\u30ea\u30f3\u30af\u30b8\u30e3\u30d1\u30f3\u682a\u5f0f\u4f1a\u793e", "version": null }, { "model": "dir-867", "scope": null, "trust": 0.8, "vendor": "\u30c7\u30a3\u30fc\u30ea\u30f3\u30af\u30b8\u30e3\u30d1\u30f3\u682a\u5f0f\u4f1a\u793e", "version": null }, { "model": "dir-2640", "scope": null, "trust": 0.8, "vendor": "\u30c7\u30a3\u30fc\u30ea\u30f3\u30af\u30b8\u30e3\u30d1\u30f3\u682a\u5f0f\u4f1a\u793e", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-008159" }, { "db": "NVD", "id": "CVE-2022-1262" } ] }, "cve": "CVE-2022-1262", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "CVE-2022-1262", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.9, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2022-1262", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-1262", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-1262", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2022-1262", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202204-2826", "trust": 0.6, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2022-1262", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULMON", "id": "CVE-2022-1262" }, { "db": "JVNDB", "id": "JVNDB-2022-008159" }, { "db": "CNNVD", "id": "CNNVD-202204-2826" }, { "db": "NVD", "id": "CVE-2022-1262" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A command injection vulnerability in the protest binary allows an attacker with access to the remote command line interface to execute arbitrary commands as root. dir-1360 firmware, dir-1760 firmware, dir-1960 For multiple D-Link Japan Co., Ltd. products such as firmware, OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2022-1262" }, { "db": "JVNDB", "id": "JVNDB-2022-008159" }, { "db": "VULMON", "id": "CVE-2022-1262" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-1262", "trust": 3.3 }, { "db": "TENABLE", "id": "TRA-2022-09", "trust": 2.5 }, { "db": "JVNDB", "id": "JVNDB-2022-008159", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202204-2826", "trust": 0.6 }, { "db": "VULMON", "id": "CVE-2022-1262", "trust": 0.1 } ], "sources": [ { "db": "VULMON", "id": "CVE-2022-1262" }, { "db": "JVNDB", "id": "JVNDB-2022-008159" }, { "db": "CNNVD", "id": "CNNVD-202204-2826" }, { "db": "NVD", "id": "CVE-2022-1262" } ] }, "id": "VAR-202204-0705", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.4205193725 }, "last_update_date": "2024-11-23T22:32:53.734000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "D-Link Routers Fixes for operating system command injection vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=189807" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202204-2826" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-78", "trust": 1.0 }, { "problemtype": "OS Command injection (CWE-78) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-008159" }, { "db": "NVD", "id": "CVE-2022-1262" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://www.tenable.com/security/research/tra-2022-09" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-1262" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-1262/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/78.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULMON", "id": "CVE-2022-1262" }, { "db": "JVNDB", "id": "JVNDB-2022-008159" }, { "db": "CNNVD", "id": "CNNVD-202204-2826" }, { "db": "NVD", "id": "CVE-2022-1262" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULMON", "id": "CVE-2022-1262" }, { "db": "JVNDB", "id": "JVNDB-2022-008159" }, { "db": "CNNVD", "id": "CNNVD-202204-2826" }, { "db": "NVD", "id": "CVE-2022-1262" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-04-11T00:00:00", "db": "VULMON", "id": "CVE-2022-1262" }, { "date": "2023-07-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-008159" }, { "date": "2022-04-11T00:00:00", "db": "CNNVD", "id": "CNNVD-202204-2826" }, { "date": "2022-04-11T20:15:18.157000", "db": "NVD", "id": "CVE-2022-1262" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-04-18T00:00:00", "db": "VULMON", "id": "CVE-2022-1262" }, { "date": "2023-07-24T08:23:00", "db": "JVNDB", "id": "JVNDB-2022-008159" }, { "date": "2022-04-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202204-2826" }, { "date": "2024-11-21T06:40:21.910000", "db": "NVD", "id": "CVE-2022-1262" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202204-2826" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "In multiple D-Link Japan Co., Ltd. products \u00a0OS\u00a0 Command injection vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-008159" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "operating system commend injection", "sources": [ { "db": "CNNVD", "id": "CNNVD-202204-2826" } ], "trust": 0.6 } }