mirror of
https://github.com/0xMarcio/cve.git
synced 2025-11-30 18:56:19 +00:00
21 lines
1.2 KiB
Markdown
21 lines
1.2 KiB
Markdown
### [CVE-2021-27249](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27249)
|
|

|
|

|
|
&color=brightgreen)
|
|
|
|
### Description
|
|
|
|
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DAP-2020 v1.01rc001 Wi-Fi access points. Authentication is not required to exploit this vulnerability. The specific flaw exists within the processing of CGI scripts. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-11369.
|
|
|
|
### POC
|
|
|
|
#### Reference
|
|
No PoCs from references.
|
|
|
|
#### Github
|
|
- https://github.com/Alonzozzz/alonzzzo
|
|
- https://github.com/EdgeSecurityTeam/Vulnerability
|
|
- https://github.com/SexyBeast233/SecBooks
|
|
- https://github.com/tzwlhack/Vulnerability
|
|
|